From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 178C0158232 for ; Sat, 7 Dec 2024 08:57:50 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 0EE13E0BE4; Sat, 7 Dec 2024 08:56:53 +0000 (UTC) Received: from smtp.gentoo.org (mail.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 79F34E0B1C for ; Sat, 7 Dec 2024 08:56:25 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.178]) by smtp.gentoo.org (Postfix) with ESMTP id E6517335D75 for ; Sat, 7 Dec 2024 08:56:24 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id B0A0CC76C3 for ; Sat, 7 Dec 2024 08:56:24 +0000 (UTC) Subject: [gentoo-announce] [ GLSA 202412-02 ] Cacti: Multiple Vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============3767156874744652705==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Sat, 07 Dec 2024 08:56:24 -0000 Message-ID: <173356178471.7.10559149229410027762@3f85d36892cf> X-Archives-Salt: 7aa99b9f-87ba-4c01-86e0-499440f9d084 X-Archives-Hash: ea62e02243131cba1aba1e117920280b --===============3767156874744652705== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202412-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Cacti: Multiple Vulnerabilities Date: December 07, 2024 Bugs: #823788, #834597, #884799 ID: 202412-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. Background ========== Cacti is a web-based network graphing and reporting tool. Affected packages ================= Package Vulnerable Unaffected ------------------ ------------ ------------ net-analyzer/cacti < 1.2.26 >= 1.2.26 Description =========== Multiple vulnerabilities have been discovered in Cacti. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Cacti users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.26" References ========== [ 1 ] CVE-2020-14424 https://nvd.nist.gov/vuln/detail/CVE-2020-14424 [ 2 ] CVE-2022-0730 https://nvd.nist.gov/vuln/detail/CVE-2022-0730 [ 3 ] CVE-2022-46169 https://nvd.nist.gov/vuln/detail/CVE-2022-46169 [ 4 ] CVE-2022-48547 https://nvd.nist.gov/vuln/detail/CVE-2022-48547 [ 5 ] CVE-2023-30534 https://nvd.nist.gov/vuln/detail/CVE-2023-30534 [ 6 ] CVE-2023-31132 https://nvd.nist.gov/vuln/detail/CVE-2023-31132 [ 7 ] CVE-2023-39357 https://nvd.nist.gov/vuln/detail/CVE-2023-39357 [ 8 ] CVE-2023-39358 https://nvd.nist.gov/vuln/detail/CVE-2023-39358 [ 9 ] CVE-2023-39359 https://nvd.nist.gov/vuln/detail/CVE-2023-39359 [ 10 ] CVE-2023-39360 https://nvd.nist.gov/vuln/detail/CVE-2023-39360 [ 11 ] CVE-2023-39361 https://nvd.nist.gov/vuln/detail/CVE-2023-39361 [ 12 ] CVE-2023-39362 https://nvd.nist.gov/vuln/detail/CVE-2023-39362 [ 13 ] CVE-2023-39365 https://nvd.nist.gov/vuln/detail/CVE-2023-39365 [ 14 ] CVE-2023-39510 https://nvd.nist.gov/vuln/detail/CVE-2023-39510 [ 15 ] CVE-2023-39511 https://nvd.nist.gov/vuln/detail/CVE-2023-39511 [ 16 ] CVE-2023-39512 https://nvd.nist.gov/vuln/detail/CVE-2023-39512 [ 17 ] CVE-2023-39513 https://nvd.nist.gov/vuln/detail/CVE-2023-39513 [ 18 ] CVE-2023-39514 https://nvd.nist.gov/vuln/detail/CVE-2023-39514 [ 19 ] CVE-2023-39515 https://nvd.nist.gov/vuln/detail/CVE-2023-39515 [ 20 ] CVE-2023-39516 https://nvd.nist.gov/vuln/detail/CVE-2023-39516 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202412-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============3767156874744652705== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmdUDbgACgkQFMQkOaVy +9kEXRAAgzAbHThTeOQvDgFGo2uMEjo2/ioOLytuskqKE5QVcIB8a2zYp2aZPnow blhFstLaQmfsf0l7P3ur60AI7p63JpKMMGDP0yqRyvPM5p8mG/1miDF/gLoxKDpX yhVyBKAxAViV/0YiSi14faH6YHz79sM8MvbLpj4i26+aAkS7v3xw34FHAwePHx4d ZETfkKroA2hwpFJUMjJYTCP358ombk1rC9zvO1f8VrLYMfSTRvw5m240HKHoukRq UcigAfY5lJog458TWubOJzuav4NzN2TQwFrfrbNWddlQigLz5GSOZVqN97vgsJzU NLzWaJfhphML+dawVMgxoRxGNpY3s9rmT9tr5fR4ubzretd1NLHvBxFTB38BHnjq 1SeDdp8bqo1YUvJSPFs2XwvmfbfCTtmYre348doP3TV5UBOPkPpoq8NRk80raDK5 a0gL8nsW+Ot1BsQKRfVLxw/pleoV7YKwAg1bZ5AG9wbCN4xwxynF+6C7+/vdX/ua r7I1uQO3GOI2lYEUCzTkN5xnIhl+X3DLwIW1UlbzNTAZ808OU5XeTNB7Yg1Kq2CU W0aP9Yc0hp+sx+fUDzmoIyoFJl0frpsz3uDC1ncS/g29JtCaOkJeL9s+NR12V+oj WvuUMA5v6CQB5XZg1JcLDJn5cFUif0soXmaXDmE+oZmnpS6UVEE= =9+Qm -----END PGP SIGNATURE----- --===============3767156874744652705==--