——————————————————————————–
Fedora Update Notification
FEDORA-2020-885e2343ed
2020-05-14 02:28:00.022666
——————————————————————————–
Name : glpi
Product : Fedora 31
Version : 9.4.6
Release : 1.fc31
URL : http://www.glpi-project.org/
Summary : Free IT asset management software
Description :
GLPI is the Information Resource-Manager with an additional Administration-
Interface. You can use it to build up a database with an inventory for your
company (computer, software, printers…). It has enhanced functions to make
the daily life for the administrators easier, like a job-tracking-system with
mail-notification and methods to build a database with basic information
about your network-topology.
——————————————————————————–
Update Information:
Last Upstream release, including (among others): – (security) Prevent execution
of SQL injection while assigning a technician, – (security) Permit to change key
used to store passwords, – (security) Improve CSRF token, – (security) Fix
several possible XSS, – (security) Fix a few possible SQL injections, – Fix SCSS
caching issues, – Fix inline images handling on item update, – Fix PHP 7.4
compatibility, – Connect to database using socket, – … Full changelog at
https://github.com/glpi-project/glpi/milestone/39?closed=1
——————————————————————————–
ChangeLog:
* Tue May 5 2020 Johan Cwiklinski <jcwiklinski AT teclib DOT com> – 9.4.6-1
– update to 9.4.6
– drop patches applied upstream
——————————————————————————–
References:
[ 1 ] Bug #1834489 – CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834489
[ 2 ] Bug #1834492 – CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834492
[ 3 ] Bug #1834498 – CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834498
[ 4 ] Bug #1834505 – CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834505
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-885e2343ed’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2020-ee30e1109f
2020-05-14 02:35:07.837945
——————————————————————————–
Name : glpi
Product : Fedora 32
Version : 9.4.6
Release : 1.fc32
URL : http://www.glpi-project.org/
Summary : Free IT asset management software
Description :
GLPI is the Information Resource-Manager with an additional Administration-
Interface. You can use it to build up a database with an inventory for your
company (computer, software, printers…). It has enhanced functions to make
the daily life for the administrators easier, like a job-tracking-system with
mail-notification and methods to build a database with basic information
about your network-topology.
——————————————————————————–
Update Information:
Last Upstream release, including (among others): – (security) Prevent execution
of SQL injection while assigning a technician, – (security) Permit to change key
used to store passwords, – (security) Improve CSRF token, – (security) Fix
several possible XSS, – (security) Fix a few possible SQL injections, – Fix SCSS
caching issues, – Fix inline images handling on item update, – Fix PHP 7.4
compatibility, – Connect to database using socket, – … Full changelog at
https://github.com/glpi-project/glpi/milestone/39?closed=1
——————————————————————————–
ChangeLog:
* Tue May 5 2020 Johan Cwiklinski <jcwiklinski AT teclib DOT com> – 9.4.6-1
– update to 9.4.6
– drop patches applied upstream
——————————————————————————–
References:
[ 1 ] Bug #1834489 – CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834489
[ 2 ] Bug #1834492 – CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834492
[ 3 ] Bug #1834498 – CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834498
[ 4 ] Bug #1834505 – CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834505
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-ee30e1109f’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org