-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-ee30e1109f 2020-05-14 02:35:07.837945 --------------------------------------------------------------------------------
Name : glpi Product : Fedora 32 Version : 9.4.6 Release : 1.fc32 URL : http://www.glpi-project.org/ Summary : Free IT asset management software Description : GLPI is the Information Resource-Manager with an additional Administration- Interface. You can use it to build up a database with an inventory for your company (computer, software, printers...). It has enhanced functions to make the daily life for the administrators easier, like a job-tracking-system with mail-notification and methods to build a database with basic information about your network-topology.
-------------------------------------------------------------------------------- Update Information:
Last Upstream release, including (among others): - (security) Prevent execution of SQL injection while assigning a technician, - (security) Permit to change key used to store passwords, - (security) Improve CSRF token, - (security) Fix several possible XSS, - (security) Fix a few possible SQL injections, - Fix SCSS caching issues, - Fix inline images handling on item update, - Fix PHP 7.4 compatibility, - Connect to database using socket, - ... Full changelog at https://github.com/glpi-project/glpi/milestone/39?closed=1 -------------------------------------------------------------------------------- ChangeLog:
* Tue May 5 2020 Johan Cwiklinski <jcwiklinski AT teclib DOT com> - 9.4.6-1 - update to 9.4.6 - drop patches applied upstream -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1834489 - CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834489 [ 2 ] Bug #1834492 - CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834492 [ 3 ] Bug #1834498 - CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834498 [ 4 ] Bug #1834505 - CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1834505 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-ee30e1109f' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------