Lucene search

K
debianDebianDEBIAN:DLA-3486-1:370E8
HistoryJul 08, 2023 - 2:06 p.m.

[SECURITY] [DLA 3486-1] ocsinventory-server update for php-cas

2023-07-0814:06:49
lists.debian.org
5
api change
security advisory
reconfigure
ocsinventory-server
upgrade
baseurl
php-cas
debian 10 buster

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.6%


Debian LTS Advisory DLA-3486-1 [email protected]
https://www.debian.org/lts/security/ Tobias Frost
July 08, 2023 https://wiki.debian.org/LTS

Package : ocsinventory-server
Version : 2.5+dfsg1-1+deb10u1
CVE ID : n/a
Debian Bug :

The source package ocsinventory-server, a Hardware and software
inventory tool has been updated to address the API change in php-cas due
to CVE-2022-39369, see DLA 3485-1 for details.

CAS is an optional authentication mechanism in the binary package
ocsinventory-reports, and if used, ocsinventory-reports will stop
working until it has been reconfigured:

It now requires the baseURL of to-be-authenticated service to be
configured.

For ocsinventory-reports, this is configured with the variable
$cas_service_base_url in the file
/usr/share/ocsinventory-reports/backend/require/cas.config.php

Warning: regardless of this update, ocsreports-server should only be
used in secure and trusted environments.

For Debian 10 buster, this update is available through version
2.5+dfsg1-1+deb10u1.

We recommend that you upgrade your ocsinventory-server packages.

For the detailed security status of ocsinventory-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ocsinventory-server

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.6%