Fedora Linux 8812 Published by

A glpi security update has been released for Fedora 31.



SECURITY: Fedora 31 Update: glpi-9.4.6-1.fc31


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-885e2343ed
2020-05-14 02:28:00.022666
--------------------------------------------------------------------------------

Name : glpi
Product : Fedora 31
Version : 9.4.6
Release : 1.fc31
URL :   http://www.glpi-project.org/
Summary : Free IT asset management software
Description :
GLPI is the Information Resource-Manager with an additional Administration-
Interface. You can use it to build up a database with an inventory for your
company (computer, software, printers...). It has enhanced functions to make
the daily life for the administrators easier, like a job-tracking-system with
mail-notification and methods to build a database with basic information
about your network-topology.

--------------------------------------------------------------------------------
Update Information:

Last Upstream release, including (among others): - (security) Prevent execution
of SQL injection while assigning a technician, - (security) Permit to change key
used to store passwords, - (security) Improve CSRF token, - (security) Fix
several possible XSS, - (security) Fix a few possible SQL injections, - Fix SCSS
caching issues, - Fix inline images handling on item update, - Fix PHP 7.4
compatibility, - Connect to database using socket, - ... Full changelog at
  https://github.com/glpi-project/glpi/milestone/39?closed=1
--------------------------------------------------------------------------------
ChangeLog:

* Tue May 5 2020 Johan Cwiklinski - 9.4.6-1
- update to 9.4.6
- drop patches applied upstream
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1834489 - CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1834489
[ 2 ] Bug #1834492 - CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1834492
[ 3 ] Bug #1834498 - CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1834498
[ 4 ] Bug #1834505 - CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1834505
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-885e2343ed' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys