• Update to 1.2.9
  • CVE-2020-7106, CVE-2020-7237

Release notes: https://www.cacti.net/release_notes.php?version=1.2.9

This update has been submitted for testing by mstevens.

5 months ago

mstevens edited this update.

5 months ago

This update's test gating status has been changed to 'ignored'.

5 months ago

This update has been pushed to testing.

5 months ago

This update can be pushed to stable now if the maintainer wishes

5 months ago

This update has been submitted for stable by bodhi.

5 months ago

This update has been pushed to stable.

5 months ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
5 months ago
in testing
5 months ago
in stable
5 months ago
modified
5 months ago
BZ#1786609 CVE-2019-17358 cacti: unsafe deserialization of user-controlled data
0
0
BZ#1786612 CVE-2019-17358 cacti: unsafe deserialization of user-controlled data [epel-all]
0
0
BZ#1796208 CVE-2020-7106 cacti: XSS due to lack of escaping on some pages
0
0
BZ#1796209 CVE-2020-7106 cacti: XSS due to lack of escaping on some pages [epel-all]
0
0
BZ#1798187 CVE-2020-7237 cacti: remote code execution due to input validation in Performance Boost Debug Log
0
0
BZ#1798189 CVE-2020-7237 cacti: remote code execution due to input validation in Performance Boost Debug Log [epel-all]
0
0

Automated Test Results