Date: Tue, 21 Jul 2015 23:56:20 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 201702] net-mgmt/cacti: Multiple XSS and SQL injection vulnerabilities (CVE-2015-4634) Message-ID: <bug-201702-13-zlJa7MzOdO@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-201702-13@https.bugs.freebsd.org/bugzilla/> References: <bug-201702-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201702 --- Comment #12 from Jason Unovitch <jason.unovitch@gmail.com> --- Created attachment 159053 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=159053&action=edit cacti-0.8.8f_1.patch https://forums.freebsd.org/threads/problem-with-cacti-upgrading.52458/ Dan, The thread above was reported in the forums. Apparently there is a typo in the migration code in 0.8.8f and this is causing issues when starting the service after an update. Obviously that file doesn't exist. install/index.php @@ -468,7 +468,7 @@ if ($step == "4") { include ("0_8_8d_to_0_8_8e.php"); upgrade_to_0_8_8e(); }elseif ($cacti_versions[$i] == "0.8.8f") { - include ("0_8_8f_to_0_8_8f.php"); + include ("0_8_8e_to_0_8_8f.php"); upgrade_to_0_8_8f(); } } Mark, Can we get this applied and MFH'd? Upstream Bug Reference: http://bugs.cacti.net/view.php?id=2605 -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201702-13-zlJa7MzOdO>