• [SECURITY] [DSA 5550-1] cacti security update

    From Moritz Muehlenhoff@21:1/5 to All on Wed Nov 8 23:50:01 2023
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5550-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 08, 2023 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : cacti
    CVE ID : CVE-2023-39357 CVE-2023-39359 CVE-2023-39361 CVE-2023-39362
    CVE-2023-39364 CVE-2023-39365 CVE-2023-39513 CVE-2023-39515
    CVE-2023-39516 CVE-2023-39514 CVE-2023-39512 CVE-2023-39510
    CVE-2023-39366

    Multiple security vulnerabilities have been discovered in Cacti, a web interface for graphing of monitoring systems, which could result in
    cross-site scripting, SQL injection, an open redirect or command injection.

    For the oldstable distribution (bullseye), these problems have been fixed
    in version 1.2.16+ds1-2+deb11u2.

    For the stable distribution (bookworm), these problems have been fixed in version 1.2.24+ds1-1+deb12u1.

    We recommend that you upgrade your cacti packages.

    For the detailed security status of cacti please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/cacti

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmVMDYgACgkQEMKTtsN8 TjYzmhAAny8lZgRdlKAadeOGxULyDwZMzGhq9zoHUX2otN3nwIuQEotG6m9/Lc3+ IQNpase5cNYZZMlF7lA5u34cbHNmnVnraEARUnU1PwsFOjAamv8JWxEfyGEV/V0f Saj7TNBYarHBGGHXhX1uFYQXMyVSTGNWmof7AmvhHol+CqgxSfzhq5i/ue+dtnNA fx1pZ+SzznBJsndUeltEi8CdsIqcdGlldO0UWIj9G0pF2Fs6bvfi9heVKF1D1Wax UzjUZUdmSgzNZ3d6RAjhfA7ButjKdViaKjE93ARfOcl1I5kvR2whqe6RILkx+7Nq oQ/JdR1uYbg7wmKPb5+zivmJWk+PBXXlncSTkzuUC9JTx/ypO5x4/op0SD/hz2YH hFonL4Y2tSgQGiAuBqYwWTBjy6NyX+59lKSrbNF2Dt1GdTtR1Dwvzxe8NneEV+kD MwgTEli9D0QDYu8pF6b8OegkK0UJk/gu6w/88xF+E4zTvoFjeXI/Wp9c0sN0zqgy UIWnLyhv5PVYa5TJt1W0RK9QmZyNJ6uLv0xS4LKf28TYU4rI8ilw4/w8lDFE3ox7 pUuSa52b2cK5R5I9UXCwIuT+RQZD9QMu8/MFgbmBlI0fXol7Qr7BblK7vEy+HADg XcJQXJxhDcsIfy5YXNj1N1ps3My/FUD/Ui1gCM/4zt9sg9OMiJ4=
    =Exbi
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)