[Security] cacti - CVE-2009-4032, CVE-2010-1431, and CVE-2010-2092

Bug #599892 reported by Brian Thomason
280
This bug affects 3 people
Affects Status Importance Assigned to Milestone
cacti (Ubuntu)
Invalid
Medium
Unassigned
Hardy
Won't Fix
Undecided
Brian Thomason
Jaunty
Won't Fix
Undecided
Brian Thomason
Karmic
Won't Fix
Undecided
Brian Thomason
Lucid
Fix Released
Undecided
Brian Thomason
Maverick
Invalid
Medium
Unassigned

Bug Description

Binary package hint: cacti

cacti 0.8.7b-2.1ubuntu2 in Jaunty needs 3 security patches merged from Debian.

Changed in cacti (Ubuntu):
status: New → In Progress
assignee: nobody → Brian Thomason (brian-thomason)
Revision history for this message
Brian Thomason (brian-thomason) wrote :

Sanity tested package (built, installed, basic functionality works). Also tested the input validation to ensure if improper offsets were passed, a validation error would be thrown. This was confirmed to work.

Changed in cacti (Ubuntu):
status: In Progress → New
visibility: private → public
Changed in cacti (Ubuntu):
status: New → Confirmed
importance: Undecided → Medium
Changed in cacti (Ubuntu Hardy):
status: New → Confirmed
Changed in cacti (Ubuntu Lucid):
status: New → Confirmed
Changed in cacti (Ubuntu Jaunty):
status: New → Confirmed
Changed in cacti (Ubuntu Karmic):
status: New → Confirmed
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

There are more security issues in cacti that need fixing:

cacti 0.8.7g fixes CVE-2010-2543, CVE-2010-2544, CVE-2010-2545
cacti 0.8.7f fixes CVE-2010-1644, CVE-2010-1645, CVE-2010-2092, CVE-2010-1431

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Unsubscribing ubuntu-security-sponsors since the debdiff is incomplete.

Changed in cacti (Ubuntu Lucid):
status: Confirmed → Incomplete
assignee: nobody → Brian Thomason (brian-thomason)
Changed in cacti (Ubuntu Hardy):
status: Confirmed → Incomplete
assignee: nobody → Brian Thomason (brian-thomason)
Changed in cacti (Ubuntu Jaunty):
status: Confirmed → Incomplete
assignee: nobody → Brian Thomason (brian-thomason)
Changed in cacti (Ubuntu Karmic):
status: Confirmed → Incomplete
assignee: nobody → Brian Thomason (brian-thomason)
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Please resubscribe ubuntu-security-sponsors and set the status to 'NEW' when the changes are complete. Thanks!

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Maverick is affected by CVE-2009-4032 for sure, and CVE-2009-4112 needs to be investigated.

Changed in cacti (Ubuntu Maverick):
status: Confirmed → Incomplete
papukaija (papukaija)
tags: added: jaunty karmic lucid maverick
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

CVE-2009-4032, CVE-2010-1644, CVE-2010-1645, CVE-2010-2543, CVE-2010-2544, and CVE-2010-2545 are all fixed in 0.8.7g-1.

Changed in cacti (Ubuntu Maverick):
assignee: Brian Thomason (brian-thomason) → Jamie Strandboge (jdstrand)
status: Incomplete → Confirmed
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

I am going to close the maverick task since I created a sync request for it in https://bugs.edge.launchpad.net/ubuntu/+source/cacti/+bug/646909.

Changed in cacti (Ubuntu Maverick):
assignee: Jamie Strandboge (jdstrand) → nobody
status: Confirmed → Invalid
Revision history for this message
Brian Thomason (brian-thomason) wrote :

2009-4032 - Already patched
2009-4112 - Affected but of low importance; upstream has not provided a patch
2010-1431 - Patched
2010-1644 - Patched
2010-1645 - Patched
2010-2092 - Patched
2010-2543,2544,2545 - Patched

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for the debdiff Brian.

There seems to be parts missing from the 2010-254* patch...AFAICT, the upstream commits are:

http://svn.cacti.net/viewvc?view=rev&revision=6025
http://svn.cacti.net/viewvc?view=rev&revision=6037
http://svn.cacti.net/viewvc?view=rev&revision=6038
http://svn.cacti.net/viewvc?view=rev&revision=6041
http://svn.cacti.net/viewvc?view=rev&revision=6042

Could you check, and update the patch if necessary?

Also, you should add Origin tags to your patches in the future so they are easier to retrace to the upstream commits, for example:

Origin: upstream, http://svn.cacti.net/viewvc?view=rev&revision=6025
or
Origin: backport, http://svn.cacti.net/viewvc?view=rev&revision=6025

I'm unsubscribing ubuntu-security-sponsors for now. Please re-subscribe ubuntu-security-sponsors when you update debdiff, and set the status to "NEW".

Thanks!

Revision history for this message
Brian Thomason (brian-thomason) wrote :
Changed in cacti (Ubuntu):
status: Invalid → New
Revision history for this message
Brian Thomason (brian-thomason) wrote :

Sorry about that major oversight. The lucid debdiff should be complete now.

Revision history for this message
Artur Rona (ari-tczew) wrote :

Jaunty is EOL.

Changed in cacti (Ubuntu Jaunty):
status: Incomplete → Won't Fix
Kees Cook (kees)
Changed in cacti (Ubuntu):
status: New → Invalid
Changed in cacti (Ubuntu Lucid):
status: Incomplete → New
Revision history for this message
Kees Cook (kees) wrote :

ACK for lucid, though I updated the version to be -2ubuntu0.1 instead of -2.1, following the versioning guide at https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation

I'll upload this to security-proposed shortly. Thanks!

tags: added: security-verification
Changed in cacti (Ubuntu Lucid):
status: New → In Progress
Kees Cook (kees)
Changed in cacti (Ubuntu Lucid):
status: In Progress → Fix Committed
Revision history for this message
Kees Cook (kees) wrote :

Pocket copied cacti to proposed. Please test and give feedback here. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Thank you in advance!

tags: added: verification-needed
removed: security-verification
Revision history for this message
Kees Cook (kees) wrote :

To ubuntu-sru: if this passes the verification process, please also pocket copy to security. Thanks!

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Unsubscribing ubuntu-security-sponsors. Please resubscribe if providing another debdiff for review.

Revision history for this message
Brian Thomason (brian-thomason) wrote :

I tested this package pretty thoroughly before submitting the debdiff. I installed it, added graphs, and verified that all the scripts that were modified could be used successfully.

I'm sure you want a second pair of eyes on it though.

tags: added: verification-done
removed: verification-needed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package cacti - 0.8.7e-2ubuntu0.1

---------------
cacti (0.8.7e-2ubuntu0.1) lucid-security; urgency=low

  * SECURITY UPDATE: Fix SQL injection vulnerability in templates_export.php
    (LP: #599892)
    - debian/patches/CVE-2010-1431.patch: patch derived from upstream patch
    - CVE-2010-1431
  * SECURITY UPDATE: Fix cross-site scripting (XSS) vulnerabilities
    - debian/patches/CVE-2010-1644.patch: patch derived from upstream patch
    - CVE-2010-1644
  * SECURITY UPDATE: Fix arbitrary command execution vuln
    - debian/patches/CVE-2010-1645.patch: patch derived from upstream patches
    - CVE-2010-1645
  * SECURITY UPDATE: Fix a SQL injection vulnerability in graph.php
    - debian/patches/CVE-2010-2092.patch: patch derived from Debian patch
    - CVE-2010-2092
    - DSA-2060
  * SECURITY UPDATE: Fix cross-site scripting (XSS) vulnerabilities
    - debian/patches/CVE-2010-2543.patch: patch derived from upstream patches
    - CVE-2010-2543
    - CVE-2010-2544
    - CVE-2010-2545
 -- Brian Thomason <email address hidden> Mon, 24 Jan 2011 11:20:13 -0500

Changed in cacti (Ubuntu Lucid):
status: Fix Committed → Fix Released
Revision history for this message
Martin Pitt (pitti) wrote :

Copied to lucid-security, too.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug and helping to make Ubuntu better. The package referred to in this bug is in universe or multiverse and reported against a release of Ubuntu (hardy) which no longer receives updates outside of the explicitly supported LTS packages. While the bug against hardy is being marked "Won't Fix" for now, if you are interested feel free to post a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures'

Please feel free to report any other bugs you may find.

Changed in cacti (Ubuntu Karmic):
status: Incomplete → Won't Fix
Changed in cacti (Ubuntu Hardy):
status: Incomplete → Won't Fix
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting this bug to Ubuntu. karmic has reached EOL
(End of Life) and is no longer supported. As a result, this bug
against karmic is being marked "Won't Fix". Please see
https://wiki.ubuntu.com/Releases for currently supported Ubuntu
releases.

Please feel free to report any other bugs you may find.

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.