FEDORA-2020-ee30e1109f created by trasher 5 months ago for Fedora 32
stable

Last Upstream release, including (among others):

  • (security) Prevent execution of SQL injection while assigning a technician,
  • (security) Permit to change key used to store passwords,
  • (security) Improve CSRF token,
  • (security) Fix several possible XSS,
  • (security) Fix a few possible SQL injections,
  • Fix SCSS caching issues,
  • Fix inline images handling on item update,
  • Fix PHP 7.4 compatibility,
  • Connect to database using socket,
  • ...

Full changelog at https://github.com/glpi-project/glpi/milestone/39?closed=1

How to install

sudo dnf upgrade --advisory=FEDORA-2020-ee30e1109f

This update has been submitted for testing by trasher.

5 months ago

This update's test gating status has been changed to 'waiting'.

5 months ago

This update's test gating status has been changed to 'ignored'.

5 months ago

This update has been pushed to testing.

5 months ago

trasher edited this update.

5 months ago

trasher edited this update.

5 months ago

trasher edited this update.

5 months ago

This update can be pushed to stable now if the maintainer wishes

5 months ago

This update has been submitted for stable by bodhi.

5 months ago

This update has been pushed to stable.

5 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
5 months ago
in testing
5 months ago
in stable
5 months ago
modified
5 months ago
BZ#1834489 CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
0
0
BZ#1834492 CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
0
0
BZ#1834498 CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
0
0
BZ#1834505 CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
0
0

Automated Test Results