Lucene search

K
suseSuseOPENSUSE-SU-2021:0755-1
HistoryMay 21, 2021 - 12:00 a.m.

Security update for cacti, cacti-spine (important)

2021-05-2100:00:00
lists.opensuse.org
11

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

An update that fixes one vulnerability is now available.

Description:

This update for cacti, cacti-spine fixes the following issues:

cacti-spine was updated to 1.2.17:

  • Avoid triggering DDos detection in firewalls on large systems
  • Use mysql reconnect option properly
  • Fix possible creashes in various operations
  • Fix remote data collectors pushing too much data to main when performing
    diagnostics
  • Make spine more responsive when remote connection is down
  • Fix various MySQL issues
  • Make spine immune to DST changes

cacti-spine 1.2.16:

  • Some developer debug log messages falsely labeled as WARNINGS
  • Remove the need of the dos2unix program
  • Fix Spine experiencing MySQL socket error 2002 under load
  • Under heavy load MySQL/MariaDB return 2006 and 2013 errors on query
  • Add backtrace output to stderr for signals
  • Add Data Source turnaround time to debug output

cacti-spine 1.2.15:

  • Special characters may not always be ignored properly

cacti was updated to 1.2.17:

  • Fix incorrect handling of fields led to potential XSS issues
  • CVE-2020-35701: Fix SQL Injection vulnerability (boo#1180804)
  • Fix various XSS issues with HTML Forms handling
  • Fix handling of Daylight Saving Time changes
  • Multiple fixes and extensions to plugins
  • Fix multiple display, export, and input validation issues
  • SNMPv3 Password field was not correctly limited
  • Improved regular expression handling for searcu
  • Improved support for RRDproxy
  • Improved behavior on large systems
  • MariaDB/MysQL: Support persistent connections and improve multiple
    operations and options
  • Add Theme ‘Midwinter’
  • Modify automation to test for data before creating graphs
  • Add hooks for plugins to show customize graph source and customize
    template url
  • Allow CSRF security key to be refreshed at command line
  • Allow remote pollers statistics to be cleared
  • Allow user to be automatically logged out after admin defined period
  • When replicating, ensure Cacti can detect and verify replica servers

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2021-755=1

  • SUSE Package Hub for SUSE Linux Enterprise 12:

    zypper in -t patch openSUSE-2021-755=1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P