File _patchinfo of Package patchinfo
<patchinfo incident="12027"> <issue tracker="fate" id="326485"/> <issue tracker="cve" id="2019-17357"/> <issue tracker="cve" id="2020-7237"/> <issue tracker="cve" id="2019-17358"/> <issue tracker="cve" id="2009-4112"/> <issue tracker="cve" id="2018-20725"/> <issue tracker="cve" id="2018-20723"/> <issue tracker="cve" id="2018-20726"/> <issue tracker="cve" id="2018-20724"/> <issue tracker="cve" id="2020-7106"/> <issue tracker="cve" id="2019-16723"/> <issue tracker="bnc" id="1101139">cacti.conf Apache Invalid command 'Order'</issue> <issue tracker="bnc" id="1161297">VUL-0: CVE-2020-7237: cacti: Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php</issue> <issue tracker="bnc" id="1158992">VUL-0: CVE-2019-17358: cacti: Unsafe deserialization in sanitize_unserialize_selected_items</issue> <issue tracker="bnc" id="1122535">VUL-1: CVE-2009-4112: cacti: Privilege escalation under certain conditions</issue> <issue tracker="bnc" id="1122244">VUL-1: CVE-2018-20724: cacti: cross-site scripting (XSS) vulnerability exists in pollers.php due to lack of escaping of unintended characters in the Website Hostname for Data Collectors.</issue> <issue tracker="bnc" id="1122243">VUL-1: CVE-2018-20725: cacti: cross-site scripting (XSS) vulnerability exists in graph_templates.php due to lack of escaping of unintended characters in the Graph Vertical Label.</issue> <issue tracker="bnc" id="1122242">VUL-1: CVE-2018-20726: cacti: cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti in the Website Hostname field for Devices.</issue> <issue tracker="bnc" id="1101024">missing php packages in cacti.spec</issue> <issue tracker="bnc" id="1158990">VUL-0: CVE-2019-17357: cacti: sql injection in graphs.php</issue> <issue tracker="bnc" id="1082318">Packages must not mark license files as %doc</issue> <issue tracker="bnc" id="1122245">VUL-1: CVE-2018-20723: cacti: cross-site scripting (XSS) vulnerability exists in color_templates.php due to lack of escaping of unintended characters in the Name field for a Color.</issue> <issue tracker="bnc" id="1163749">VUL-0: CVE-2020-7106: cacti: Lack of escaping on some pages can lead to XSS exposure</issue> <packager>AndreasStieger</packager> <rating>important</rating> <category>security</category> <summary>Security update for cacti, cacti-spine</summary> <description>This update for cacti, cacti-spine fixes the following issues: cacti-spine was updated to version 1.2.9. Security issues fixed: - CVE-2009-4112: Fixed a privilege escalation (bsc#1122535). - CVE-2018-20723: Fixed a cross-site scripting (XSS) vulnerability (bsc#1122245). - CVE-2018-20724: Fixed a cross-site scripting (XSS) vulnerability (bsc#1122244). - CVE-2018-20725: Fixed a privilege escalation that could occur under certain conditions (bsc#1122535). - CVE-2018-20726: Fixed a cross-site scripting (XSS) vulnerability (bsc#1122242). - CVE-2019-16723: Fixed an authentication bypass vulnerability. - CVE-2019-17357: Fixed an SQL injection vulnerability (bsc#1158990). - CVE-2019-17358: Fixed an unsafe deserialization in sanitize_unserialize_selected_items (bsc#1158992). - CVE-2020-7106: Fixed a potential cross-site scripting (XSS) vulnerability (bsc#1163749). - CVE-2020-7237: Fixed a remote code execution that affected privileged users via shell metacharacters in the Performance Boost Debug Log field (bsc#1161297). Non-security issues fixed: - Fixed missing packages php-json, php-ctype, and php-gd in cacti.spec (boo#1101024). - Fixed Apache2.4 and Apache2.2 runtime configuration issue (boo#1101139). </description> </patchinfo>