--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2024-17176c2215
2024-05-31 01:11:22.902644
--------------------------------------------------------------------------------

Name        : cacti-spine
Product     : Fedora EPEL 9
Version     : 1.2.27
Release     : 1.el9
URL         : https://cacti.net
Summary     : Threaded poller for Cacti written in C
Description :
Spine is a supplemental poller for Cacti that makes use of pthreads to achieve
excellent performance.

--------------------------------------------------------------------------------
Update Information:

Update cacti and cacti-spine to version 1.2.27. This includes the upstream fixes
for many CVEs, including a critical remote code execution bug.
https://github.com/Cacti/cacti/blob/release/1.2.27/CHANGELOG
https://github.com/Cacti/spine/blob/release/1.2.27/CHANGELOG
--------------------------------------------------------------------------------
ChangeLog:

* Wed May 22 2024 Carl George <[email protected]> - 1.2.27-1
- Update to version 1.2.27
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2255603 - CVE-2023-49084 cacti: RCE when managing links [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2255603
  [ 2 ] Bug #2255607 - CVE-2023-49086 cacti: XSS when adding new devices 
[epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2255607
  [ 3 ] Bug #2255668 - CVE-2023-49085 CVE-2023-49088 CVE-2023-50250 
CVE-2023-51448 cacti: Multiple vulnerabilities [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2255668
  [ 4 ] Bug #2280481 - CVE-2024-34340 cacti: authentication bypass when using 
older password hashes [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2280481
  [ 5 ] Bug #2280496 - CVE-2024-29894 cacti: XSS vulnerability when using 
JavaScript based messaging API [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2280496
  [ 6 ] Bug #2280499 - CVE-2024-31458 CVE-2024-31459 CVE-2024-31460 cacti: 
multiple vulnerabilities [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2280499
  [ 7 ] Bug #2280502 - CVE-2024-31443 CVE-2024-31444 CVE-2024-31445 cacti: 
multiple vulnerabilties [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2280502
  [ 8 ] Bug #2280505 - CVE-2024-25641 cacti: remote code execution 
vulnerability [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2280505
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update cacti-spine' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--
_______________________________________________
epel-package-announce mailing list -- 
[email protected]
To unsubscribe send an email to 
[email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to