148 Commits

Author SHA256 Message Date
e7a280cb84 Accepting request 1266914 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/1266914
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=52
2025-04-04 15:29:56 +00:00
f10f62da74 - cacti 1.2.30
- issue#6089: Unable to add new users
 - issue#6090: When using Automation Rules, specifying graph criteria may cause issues
 - issue#6099: When transferring a system from a backup if the poller has not run recently rrdtool issues are found
 - issue#6172: When translating, quotes may cause incorrect text to appear
 - issue#6173: When using Boost for the first time, warnings may appear
 - issue#6183: When refreshing forms, items may be checked incorrectly by xmacan

OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=190
2025-04-03 14:35:27 +00:00
8378594af1 Accepting request 1254510 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/1254510
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=51
2025-03-20 18:24:49 +00:00
a375bf036b - to fix openSUSE:Factory/cacti package acceptance
- Oct 9 2024 Changelog did not describe cactid_service.patch
 - Feb 11 2025 Changelog mispelled cacti-config-dist.patch 
 - Removed obsolete cacti-cron.timer cacti-cron.service cacti-config.patch
- cacti 1.2.29
  - security - GHSA-c5j8-jxj3-hh36 - Authenticated RCE via multi-line SNMP responses
  - security - GHSA-f9c7-7rc3-574c - SQL Injection vulnerability when using tree rules through Automation API
  - security - GHSA-fh3x-69rr-qqpp - SQL Injection vulnerability when request automation devices
  - security - GHSA-fxrq-fr7h-9rqq - Arbitrary File Creation leading to RCE
  - security - GHSA-pv2c-97pp-vxwg - Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path
  - security - GHSA-vj9g-P7F2-4wqj - SQL Injection vulnerability when view host template
  - issue - 5843 - Temporary table names may incorrectly think they have a schema
  - issue - 5847 - When using Preset Time to view graphs, it is using a fixed point rather than relative time
  - issue - 5848 - Fix issue where RRA files are not automatically removed
  - issue - 5856 - Fix invalid help link for Automation Networks
  - issue - 5867 - Unable to disable a tree within the GUI
  - issue - 5868 - When removing graphs, RRA files may be left behind
  - issue - 5869 - Improve compatibility with ping under FreeBSD
  - issue - 5870 - Improve compatibility wtih Slice RRD tool under PHP 8.x
  - issue - 5874 - Allow IPv6 formats to use colons without port
  - issue - 5884 - Update Fortigate, Aruba OSCX and Clearpass templates
  - issue - 5927 - When a plugin is disabled, unable to use GUI to enable it again
  - issue - 5932 - When upgrading, ensure that replication only runs as necessary
  - issue - 5961 - Improve caching and syncing issues with replication
  - issue - 5963 - Improve caching techniques for database calls
  - issue - 5986 - Improve compatibility for Error constants under PHP 8.4
  - issue - 5987 - When running the upgrade database script, cursor is left in the middle of the row
  - issue - 6065 - Guest page does not automatically refresh
  - issue - 6078 - When installing, conversion of tables may produce collation errors
  - feature - 5921 - Add HPE Nimble/Alletra template
  - feature - 5933 - When installing, only convert core cacti tables
- Updated patch for config.php for new name config.php.dist
- Add /srv/www directories to filelist [bsc#1231027]
- fix for cacti-cron.timer & cacti-cron.service failing after upgrade has already removed
- replace cacti-cron.timer & cacti-cron.service with cactid.service
  to fix thold & other "sub poller" poller processes not running.
- cacti 1.2.28:
    security #GHSA-49f2-hwx9-qffr: XSS vulnerability when creating external links with the consolenewsection parameter
    security #GHSA-fgc6-g8gc-wcg5: XSS vulnerability when creating external links with the title parameter
    security #GHSA-gxq4-mv8h-6qj4: RCE vulnerability can be executed via Log Poisoning
    security #GHSA-wh9c-v56x-v77c: XSS vulnerability when creating external links with the fileurl parameter
    issue #5636: When using LDAP authentication the first time, warnings may appear in logs
    issue #5754: When installing, a replication loop for plugin_realms may occur
    issue #5759: When installing, remote poller may attempt to sync with other pollers
    issue #5768: When a Data Query has a space, indexes may not be properly escaped
    issue #5771: Boost does not always order data source records properly
    issue #5772: Add IP address to the login audit for successful logins by xmacan
    issue #5773: Undefined variable error may sometimes occur when dealing with RRD output by MSS970
    issue #5777: When export to CSV, only the first line of notes is included
    issue #5780: When rendering forms, missing default value can cause errors
    issue #5782: Allow hosted content to be executable for the links page
    issue #5783: When closing database connections, some may linger incorrectly
    issue #5785: When changing passwords, an infinite loop may occur by ddb4github
    issue #5790: When using Cacti Daemon, a "Cron out of sync" message may be reported
    issue #5791: Add ability to filter/sort users by group or last login time
    issue #5792: When using List View, unable to add Graphs to a Report
    issue #5797: When using SNMPv3, some devices may show polling issues
    issue #5802: Limit table conversion to Cacti core tables
    issue #5806: Fix issues with posix-based kills on Windows
    issue #5813: When installing, password changes may fail on new installations
    issue #5814: When using structured RRD folders, permission issues may be flagged incorrectly
    issue #5823: When unable to locate a valid theme, new default will be Modern
    issue #5824: Properly cache the data source information for dsstats processing
    issue #5840: When reindexing, verify all fields may not work as intended
    feature #5784: Add ability to log database connections/disconnections
    feature #5796: Add Ping Method where connection refused assumes host is up
    feature #5819: When displaying graphs, default end time does not show full 24 hour period
    feature #5825: Add --id to remove_device.php
    feature #5828: Add Location and Site to Graph List View
    feature #5830: Add more verbose logging to Boost
    feature: Update jQuery to 3.7.1
    feature: Update jQueryUI to 1.14.0
    feature: Update Purify.js to 3.1.6
    feature: Update billboard.js to 3.13.0
    feature: Improve the performance of the repopulation of the poller cache
- attempt to set permissions on several sub folders 
  to fix https://build.opensuse.org/package/show/openSUSE:Factory/cacti#comment-1466121
- Recent builds are being placed in /usr/share instead of existing /srv/www/cacti. This is an attempt to fix

OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=188
2025-03-19 19:30:58 +00:00
e20b3e741c - Feb 11th Changelog mispelled cacti-config-dist.patch
adding it here to fix openSUSE:Factory/cacti package acceptance

OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=187
2025-03-19 18:04:28 +00:00
9e0eae9254 - Removed obsolete cacti-cron.timer to fix openSUSE:Factory/cacti package acceptance
- Removed obsolete cacti-cron.service to fix openSUSE:Factory/cacti package acceptance

OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=186
2025-03-19 15:34:09 +00:00
6660be5d48 - Removed obsolete cacti-config.patch to fix openSUSE:Factory/cacti package acceptance
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=185
2025-03-07 14:46:29 +00:00
cf3358f3a2 - cacti 1.2.29
- security - GHSA-c5j8-jxj3-hh36 - Authenticated RCE via multi-line SNMP responses
  - security - GHSA-f9c7-7rc3-574c - SQL Injection vulnerability when using tree rules through Automation API
  - security - GHSA-fh3x-69rr-qqpp - SQL Injection vulnerability when request automation devices
  - security - GHSA-fxrq-fr7h-9rqq - Arbitrary File Creation leading to RCE
  - security - GHSA-pv2c-97pp-vxwg - Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path
  - security - GHSA-vj9g-P7F2-4wqj - SQL Injection vulnerability when view host template
  - issue - 5843 - Temporary table names may incorrectly think they have a schema
  - issue - 5847 - When using Preset Time to view graphs, it is using a fixed point rather than relative time
  - issue - 5848 - Fix issue where RRA files are not automatically removed
  - issue - 5856 - Fix invalid help link for Automation Networks
  - issue - 5867 - Unable to disable a tree within the GUI
  - issue - 5868 - When removing graphs, RRA files may be left behind
  - issue - 5869 - Improve compatibility with ping under FreeBSD
  - issue - 5870 - Improve compatibility wtih Slice RRD tool under PHP 8.x
  - issue - 5874 - Allow IPv6 formats to use colons without port
  - issue - 5884 - Update Fortigate, Aruba OSCX and Clearpass templates
  - issue - 5927 - When a plugin is disabled, unable to use GUI to enable it again
  - issue - 5932 - When upgrading, ensure that replication only runs as necessary
  - issue - 5961 - Improve caching and syncing issues with replication
  - issue - 5963 - Improve caching techniques for database calls
  - issue - 5986 - Improve compatibility for Error constants under PHP 8.4
  - issue - 5987 - When running the upgrade database script, cursor is left in the middle of the row
  - issue - 6065 - Guest page does not automatically refresh
  - issue - 6078 - When installing, conversion of tables may produce collation errors
  - feature - 5921 - Add HPE Nimble/Alletra template
  - feature - 5933 - When installing, only convert core cacti tables
- Updated patch for config.php for new name config.php.dist
- Add /srv/www directories to filelist [bsc#1231027]
- fix for cacti-cron.timer & cacti-cron.service failing after upgrade has already removed
- replace cacti-cron.timer & cacti-cron.service with cactid.service
  to fix thold & other "sub poller" poller processes not running.
- cacti 1.2.28:
    security #GHSA-49f2-hwx9-qffr: XSS vulnerability when creating external links with the consolenewsection parameter
    security #GHSA-fgc6-g8gc-wcg5: XSS vulnerability when creating external links with the title parameter
    security #GHSA-gxq4-mv8h-6qj4: RCE vulnerability can be executed via Log Poisoning
    security #GHSA-wh9c-v56x-v77c: XSS vulnerability when creating external links with the fileurl parameter
    issue #5636: When using LDAP authentication the first time, warnings may appear in logs
    issue #5754: When installing, a replication loop for plugin_realms may occur
    issue #5759: When installing, remote poller may attempt to sync with other pollers
    issue #5768: When a Data Query has a space, indexes may not be properly escaped
    issue #5771: Boost does not always order data source records properly
    issue #5772: Add IP address to the login audit for successful logins by xmacan
    issue #5773: Undefined variable error may sometimes occur when dealing with RRD output by MSS970
    issue #5777: When export to CSV, only the first line of notes is included
    issue #5780: When rendering forms, missing default value can cause errors
    issue #5782: Allow hosted content to be executable for the links page
    issue #5783: When closing database connections, some may linger incorrectly
    issue #5785: When changing passwords, an infinite loop may occur by ddb4github
    issue #5790: When using Cacti Daemon, a "Cron out of sync" message may be reported
    issue #5791: Add ability to filter/sort users by group or last login time
    issue #5792: When using List View, unable to add Graphs to a Report
    issue #5797: When using SNMPv3, some devices may show polling issues
    issue #5802: Limit table conversion to Cacti core tables
    issue #5806: Fix issues with posix-based kills on Windows
    issue #5813: When installing, password changes may fail on new installations
    issue #5814: When using structured RRD folders, permission issues may be flagged incorrectly
    issue #5823: When unable to locate a valid theme, new default will be Modern
    issue #5824: Properly cache the data source information for dsstats processing
    issue #5840: When reindexing, verify all fields may not work as intended
    feature #5784: Add ability to log database connections/disconnections
    feature #5796: Add Ping Method where connection refused assumes host is up
    feature #5819: When displaying graphs, default end time does not show full 24 hour period
    feature #5825: Add --id to remove_device.php
    feature #5828: Add Location and Site to Graph List View
    feature #5830: Add more verbose logging to Boost
    feature: Update jQuery to 3.7.1
    feature: Update jQueryUI to 1.14.0
    feature: Update Purify.js to 3.1.6
    feature: Update billboard.js to 3.13.0
    feature: Improve the performance of the repopulation of the poller cache
- attempt to set permissions on several sub folders 
  to fix https://build.opensuse.org/package/show/openSUSE:Factory/cacti#comment-1466121
- Recent builds are being placed in /usr/share instead of existing /srv/www/cacti. This is an attempt to fix.

OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=184
2025-03-07 14:14:43 +00:00
332b05eaf9 Accepting request 1174071 from server:monitoring
cacti 1.2.27
* CVE-2024-34340: Authentication Bypass when using using older password hashes (boo#1224240)
* CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
* CVE-2024-31459: RCE vulnerability when plugins include files (boo#1224238)
* CVE-2024-31460: SQL Injection vulnerability when using tree rules through Automation API (boo#1224239)
* CVE-2024-29894: XSS vulnerability when using JavaScript based messaging API (boo#1224231)
* CVE-2024-31458: SQL Injection vulnerability when using form templates (boo#1224241)
* CVE-2024-31444: XSS vulnerability when reading tree rules with Automation API (boo#1224236)
* CVE-2024-31443: XSS vulnerability when managing data queries (boo#1224235)
* CVE-2024-31445: SQL Injection vulnerability when retrieving graphs using Automation API (boo#1224237)
* CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)

OBS-URL: https://build.opensuse.org/request/show/1174071
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=50
2024-05-15 19:27:24 +00:00
4f4db48bd6 Accepting request 1174069 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.27
  * CVE-2024-34340: Authentication Bypass when using using older password hashes (boo#1224240)
  * CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
  * CVE-2024-31459: RCE vulnerability when plugins include files (boo#1224238)
  * CVE-2024-31460: SQL Injection vulnerability when using tree rules through Automation API (boo#1224239)
  * CVE-2024-29894: XSS vulnerability when using JavaScript based messaging API (boo#1224231)
  * CVE-2024-31458: SQL Injection vulnerability when using form templates (boo#1224241)
  * CVE-2024-31444: XSS vulnerability when reading tree rules with Automation API (boo#1224236)
  * CVE-2024-31443: XSS vulnerability when managing data queries (boo#1224235)
  * CVE-2024-31445: SQL Injection vulnerability when retrieving graphs using Automation API (boo#1224237)
  * CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)

OBS-URL: https://build.opensuse.org/request/show/1174069
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=182
2024-05-14 18:45:51 +00:00
40045510fe Accepting request 1150931 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/1150931
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=49
2024-02-27 21:47:02 +00:00
ac30fca457 Accepting request 1150847 from home:dimstar:rpm4.20:c
Prepare for RPM 4.20

OBS-URL: https://build.opensuse.org/request/show/1150847
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=180
2024-02-26 10:34:22 +00:00
d27e01bc30 Accepting request 1134986 from server:monitoring
cacti 1.2.26
CVE-2023-50250 boo#1218380
CVE-2023-49084 boo#1218360
CVE-2023-49085 boo#1218378
CVE-2023-49086 boo#1218366
CVE-2023-49088 boo#1218379
CVE-2023-51448 boo#1218381

OBS-URL: https://build.opensuse.org/request/show/1134986
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=48
2023-12-25 18:06:05 +00:00
b607c00500 Accepting request 1134985 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.26
CVE-2023-50250 boo#1218380
CVE-2023-49084 boo#1218360
CVE-2023-49085 boo#1218378
CVE-2023-49086 boo#1218366
CVE-2023-49088 boo#1218379
CVE-2023-51448 boo#1218381

OBS-URL: https://build.opensuse.org/request/show/1134985
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=178
2023-12-24 13:12:40 +00:00
3561bf162f Accepting request 1109347 from server:monitoring
cl update for tracking...

CVE-2023-30534 boo#1215082
CVE-2023-39360 boo#1215044
CVE-2023-39361 boo#1215045
CVE-2023-39357 boo#1215040
CVE-2023-39362 boo#1215047
CVE-2023-39359 boo#1215043
CVE-2023-39358 boo#1215042
CVE-2023-39365 boo#1215051
CVE-2023-39364 boo#1215050
CVE-2023-39366 boo#1215052
CVE-2023-39510 boo#1215053
CVE-2023-39511 boo#1215081
CVE-2023-39512 boo#1215054
CVE-2023-39513 boo#1215055
CVE-2023-39514 boo#1215056
CVE-2023-39515 boo#1215058
CVE-2023-39516 boo#1215059

OBS-URL: https://build.opensuse.org/request/show/1109347
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=47
2023-09-07 19:12:58 +00:00
ab0297d17d server now has a proper cert chain
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=176
2023-09-06 20:51:36 +00:00
5b23ba7e3c OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=175 2023-09-06 20:35:58 +00:00
7615e92562 Accepting request 1109188 from server:monitoring
cacti 1.2.25 (boo#1215024)

OBS-URL: https://build.opensuse.org/request/show/1109188
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=46
2023-09-06 16:59:29 +00:00
a5080856f9 Accepting request 1109187 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.25 (boo#1215024)

OBS-URL: https://build.opensuse.org/request/show/1109187
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=173
2023-09-06 06:08:29 +00:00
ae7ac110b8 Accepting request 1068075 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/1068075
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=45
2023-02-28 11:49:03 +00:00
a3610d2dfc Accepting request 1068073 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.24

OBS-URL: https://build.opensuse.org/request/show/1068073
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=171
2023-02-27 22:57:57 +00:00
b5e0ed05b3 Accepting request 1046255 from server:monitoring
cacti 1.2.23 CVE-2022-46169 boo#1206185

OBS-URL: https://build.opensuse.org/request/show/1046255
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=44
2023-01-03 14:05:16 +00:00
3ee810f5fc Accepting request 1046254 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.23 CVE-2022-46169 boo#1206185

OBS-URL: https://build.opensuse.org/request/show/1046254
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=169
2023-01-02 17:58:09 +00:00
2425b39dbd Accepting request 1007577 from server:monitoring
cacti 1.2.22 (boo#1203952)

OBS-URL: https://build.opensuse.org/request/show/1007577
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=43
2022-10-03 11:46:35 +00:00
8e332d662d Accepting request 1007575 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.22 (boo#1203952)

OBS-URL: https://build.opensuse.org/request/show/1007575
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=167
2022-10-02 18:21:53 +00:00
b333e14e53 Accepting request 979660 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/979660
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=42
2022-05-30 10:43:40 +00:00
30172bdf53 Accepting request 979653 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.21

OBS-URL: https://build.opensuse.org/request/show/979653
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=165
2022-05-29 11:25:49 +00:00
b90aa45638 Accepting request 972230 from server:monitoring
cacti 1.2.20 CVE-2022-0730 boo#1196692

OBS-URL: https://build.opensuse.org/request/show/972230
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=41
2022-04-22 20:00:20 +00:00
a9f0ffd3c7 Accepting request 972161 from home:susnux:branches:server:monitoring
- Update to 1.2.20
  * Security fix for CVE-2022-0730, boo#1196692
    Under certain ldap conditions, Cacti authentication can be
    bypassed with certain credential types.

OBS-URL: https://build.opensuse.org/request/show/972161
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=163
2022-04-22 16:17:50 +00:00
be03304663 Accepting request 929901 from server:monitoring
cacti 1.2.19 boo#1192408

OBS-URL: https://build.opensuse.org/request/show/929901
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=40
2021-11-06 23:19:04 +00:00
4532f9d7a6 OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=162 2021-11-06 16:50:15 +00:00
da58c229ab Accepting request 929898 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.19 boo#1182408

OBS-URL: https://build.opensuse.org/request/show/929898
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=161
2021-11-06 16:28:25 +00:00
1638f44a9c Accepting request 913438 from server:monitoring
- cacti 1.2.18:
  * CVE-2020-14424: Lack of escaping on template import can lead to
    XSS exposure under 'midwinter' theme (boo#1188188)
  * Real time graphs can expose XSS issue

OBS-URL: https://build.opensuse.org/request/show/913438
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=39
2021-08-23 08:08:09 +00:00
1585732a85 Accepting request 913436 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.18

OBS-URL: https://build.opensuse.org/request/show/913436
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=160
2021-08-21 08:05:34 +00:00
aa7244de42 Accepting request 890825 from server:monitoring
cacti 1.2.17 CVE-2020-35701 boo#1180804

OBS-URL: https://build.opensuse.org/request/show/890825
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=38
2021-05-06 20:52:39 +00:00
1ecf3649f8 OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=158 2021-05-05 19:43:43 +00:00
508cf17de7 Accepting request 890818 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.17 CVE-2020-35701 boo#1180804

OBS-URL: https://build.opensuse.org/request/show/890818
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=157
2021-05-05 19:13:15 +00:00
fba21799b2 Accepting request 856911 from server:monitoring
- fix httpd startup errors due to mismatched configuration
  directives boo#1175314

OBS-URL: https://build.opensuse.org/request/show/856911
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=37
2020-12-21 09:23:12 +00:00
c7eb7aa85c Accepting request 856910 from home:AndreasStieger:branches:server:monitoring
- fix httpd startup errors due to mismatched configuration
  directives boo#1175314

OBS-URL: https://build.opensuse.org/request/show/856910
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=155
2020-12-18 17:50:43 +00:00
f50d2807b3 Accepting request 853622 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/853622
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=36
2020-12-08 12:24:26 +00:00
b48f7f51e7 Accepting request 852919 from home:polslinux:branches:server:monitoring
- cacti 1.2.16:
  * When generating a report, the Cascade to Branches function does not as expected
  * When viewing graphs, automatic refresh so not always work as expected
  * Realtime graph pop up counter bug
  * Undefined variable errors may occur when creating a new datasource
  * The cli-based installer does not exit with a non-zero exit code when error occurs
  * When an export is complete, sometimes the progress bar remains
  * When enabling many devices, a threshold can be reached causing a slowdown in the process
  * When performing actions against Devices, replicated device information could sometimes be lost
  * When using API to rename a tree node, backtrace may be incorrectly shown
  * When searching, valid pages can sometimes be shown as empty by ddb4github
  * When exporting data from graphs, not all data was properly included
  * Graph Templates filter is not updated after new graph created by ddb4github
  * Username and password on the login page is not visible in Classic theme
  * Improve wording of concurrent process and thread settings
  * Location filter should remove blank entries by ddb4github
  * When syncing data collectors, a reindex event may be triggered unnecessarily
  * Automation Networks allows discovery of invalid IP addresses
  * When changing permissions of the current user, they don't take effect immediately
  * When reindexing a device, an incorrect page was sometimes displayed
  * When repairing database, audit_database.php does not add missing columns
  * Log page should not be empty if no log info exists
  * During upgrade, there are times when realms can be duplicated leading to SQL errors
  * When using ping.php, UDP response times are not interpreted properly by hypnotoad
  * Improve warning you get when attempting to view a log file you don't have access to
  * When replicating files, scripts are not marked as executable
  * When creating plugin tables, collation is not set properly
  * Update c3.js to version 0.7.20
  * Update Chart.js to version 2.9.4
  * Update phpseclib to version 2.0.29
  * Update PHPMailer to version 6.1.8
  * Use LSB shebang notation for cli scripts
  * Add support for cactid daemon based launcher
  * Add ability to hide the Graph Drilldown icons by datatecuk
  * Add hooks for plugins to show custom Graph Source and custom Template URL (List View)

OBS-URL: https://build.opensuse.org/request/show/852919
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=153
2020-12-07 16:12:24 +00:00
b3ec16388e Accepting request 847931 from server:monitoring
cacti 1.2.15

OBS-URL: https://build.opensuse.org/request/show/847931
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=35
2020-11-13 17:58:10 +00:00
0873ff669b OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=151 2020-11-11 18:30:34 +00:00
bb35adb61f Accepting request 847921 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.15

OBS-URL: https://build.opensuse.org/request/show/847921
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=150
2020-11-11 18:12:47 +00:00
c58ac16c27 Accepting request 824224 from server:monitoring
cacti 1.2.14 (boo#1174850)

OBS-URL: https://build.opensuse.org/request/show/824224
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=34
2020-08-04 18:24:14 +00:00
8d16ccdad7 Accepting request 824223 from home:AndreasStieger:branches:server:monitoring
- cacti 1.2.14:
  * Poller keeps using old IP address for a device
  * poller bug fixes and various display fixes
  * Fix XSS vulnerability due to improper escaping of error message
    during template import preview (boo#1174850)

OBS-URL: https://build.opensuse.org/request/show/824223
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=148
2020-08-03 21:36:57 +00:00
54f49ce73f Accepting request 820849 from server:monitoring
- cacti 1.2.13:
  * Query XSS vulnerabilities require vendor package update
    (CVE-2020-11022 / CVE-2020-11023)
  * Lack of escaping on some pages can lead to XSS exposure
  * Update PHPMailer to 6.1.6 (CVE-2020-13625)
  * SQL Injection vulnerability due to input validation failure when
    editing colors (CVE-2020-14295, boo#1173090)
  * Lack of escaping on template import can lead to XSS exposure

OBS-URL: https://build.opensuse.org/request/show/820849
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=33
2020-07-15 13:06:18 +00:00
d67aa1b5bb Accepting request 820846 from home:AndreasStieger:branches:server:monitoring
cacti 1.2.13

OBS-URL: https://build.opensuse.org/request/show/820846
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=146
2020-07-14 09:22:41 +00:00
0d3d2a84e8 Accepting request 809673 from server:monitoring
OBS-URL: https://build.opensuse.org/request/show/809673
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/cacti?expand=0&rev=32
2020-05-28 07:20:41 +00:00
Lars Vogdt
f122bba3fc Accepting request 802716 from home:lrupp:branches:server:monitoring
- switch from cron to systemd timers (boo#1115436):
  + cacti-cron.timer
  + cacti-cron.service
- introduce rpmlintrc for obvious false positives from rpmlint
  + cacti-rpmlintrc
- use fdupes to reduce amount of needed/wasted space
- re-introduce RPM Group to avoid huge rpmlint complains on 15.1
- remove .gitignore and .gitattributes files (not needed)
- avoid potential root escalation on systems with fs.protected_hardlinks=0
  (boo#1154087): handle directory permissions in file section instead
  of using chown during post installation
- rewrote apache configuration to get rid of .htaccess files and 
  explicitely disable directory permissions per default 
  (only allow a limited, well-known set of directories)

OBS-URL: https://build.opensuse.org/request/show/802716
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/cacti?expand=0&rev=144
2020-05-27 19:01:52 +00:00