SECURITY: Fedora 32 Update: glpi-9.4.6-1.fc32
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-ee30e1109f
2020-05-14 02:35:07.837945
--------------------------------------------------------------------------------
Name : glpi
Product : Fedora 32
Version : 9.4.6
Release : 1.fc32
URL : http://www.glpi-project.org/
Summary : Free IT asset management software
Description :
GLPI is the Information Resource-Manager with an additional Administration-
Interface. You can use it to build up a database with an inventory for your
company (computer, software, printers...). It has enhanced functions to make
the daily life for the administrators easier, like a job-tracking-system with
mail-notification and methods to build a database with basic information
about your network-topology.
--------------------------------------------------------------------------------
Update Information:
Last Upstream release, including (among others): - (security) Prevent execution
of SQL injection while assigning a technician, - (security) Permit to change key
used to store passwords, - (security) Improve CSRF token, - (security) Fix
several possible XSS, - (security) Fix a few possible SQL injections, - Fix SCSS
caching issues, - Fix inline images handling on item update, - Fix PHP 7.4
compatibility, - Connect to database using socket, - ... Full changelog at
https://github.com/glpi-project/glpi/milestone/39?closed=1
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 5 2020 Johan Cwiklinski - 9.4.6-1
- update to 9.4.6
- drop patches applied upstream
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1834489 - CVE-2020-11033 glpi: any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834489
[ 2 ] Bug #1834492 - CVE-2020-11036 glpi: XSS in the comments of items in the knowledge base and via the User-Agent for administrators [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834492
[ 3 ] Bug #1834498 - CVE-2020-11035 glpi: CSRF tokens are generated using an insecure algorithm [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834498
[ 4 ] Bug #1834505 - CVE-2020-11034 glpi: bypass open redirect protection based on a regexp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1834505
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-ee30e1109f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
A glpi security update has been released for Fedora 32.