Fedora 17 : glpi-0.83.4-1.fc17 / glpi-data-injection-2.2.2-1.fc17 / etc (2012-10661)

High Nessus Plugin ID 61416


The remote Fedora host is missing one or more security updates.


The official GLPI 0.83.3 version is now available from download

This version correct several minor bugs and a security bug. You are stongly encouraged to update your actual version.

Thanks to Prajal Kulkarni.

Upstream Changelog

Version 0.83.31

- Bug #3633: Check rights for massive actions for tickets (priority / status)

- Bug #3634: Problem adding contract using template

- Bug #3635: Wrong ticket template load when changing users with different entities

- Bug #3636: count active object in ticket form

- Bug #3656: Comment on reservation item list

- Bug #3666: Redirect give right error when default entity set to another entity than the redirected item one

- Bug #3667: Unable to set password when creating users with limited rights

- Bug #3668: Ticket template and itemtype predefined problem

- Bug #3670: Check mandatory description when predefined

- Bug #3678: Problem on document_item entity information

- Bug #3680: No refresh after group creation from item form detail

- Bug #3681: Ticket notification : don't show auto close warning when autoclose = 0

- Bug #3682: Masive action lost : move network port

- Bug #3683: Display Ticket Tab

- Bug #3685: Missing in not imported email list

- Bug #3686: Broken software dictionnary

- Bug #3687: Software dictionnary results not apply during OCS import

- Bug #3689: Duplicate entry in KB

- Bug #3691: Import computer rule broken for 'name is empty'

- Bug #3693: Bug on recompute soft category

- Bug #3696: Ticket template input slashes on error

- Bug #3697: mailcollector conflict with ticket rule assign user.

- Bug #3701: Reminder list show public notes when not allowed to

- Bug #3704: CSRF prevention step 1

- Bug #3705: Security XSS for few items

- Bug #3707: CSRF prevention step 2

- Bug #3714: Templates and direct connections

- Bug #3715: Add element with a template have direct connection

- Bug #3731: CheckAlreadyPlanned for plugins

- Bug #3732: Link on checkAlreadyPlanned for ITIL tasks

- Feature #3642: Make location a user pref

- Feature #3650: Statut par defaut d'une tache

- Feature #3684: Send satisfaction survey immediatly if delay is 0

Version 0.83.4 :

- Bug #3768: Email followups Configuration

- Bug #3784: Predefined values must only be applied on ticket creation

- Bug #3786: Mail collector do not update last_updater when creating followup

- Bug #3790: Footer problem on stats display

- Bug #3791: Php-error on user creation

- Bug #3793: Missing massive action field for user (Administrative number)

- Bug #3794: Ticket template deletion troubles

- Bug #3795: Do not show deleted tickets on central view of new tickets

- Bug #3799: In notes (reminder) missing GROUP BY glpi_reminders.id in search list

- Bug #3800: HTTP_REFERER checks when behind a proxy

- Bug #3801: Ticket search troubles

This update include latest version of MassOcsImport, DataInjection and PDF plugins for compatibility with the security fix.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected packages.

See Also





Plugin Details

Severity: High

ID: 61416

File Name: fedora_2012-10661.nasl

Version: $Revision: 1.10 $

Type: local

Agent: unix

Published: 2012/08/06

Modified: 2016/05/09

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:glpi, p-cpe:/a:fedoraproject:fedora:glpi-data-injection, p-cpe:/a:fedoraproject:fedora:glpi-mass-ocs-import, p-cpe:/a:fedoraproject:fedora:glpi-pdf, cpe:/o:fedoraproject:fedora:17

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/07/14

Reference Information

BID: 54416

FEDORA: 2012-10661