Описание
ELSA-2019-0638: openwsman security update (IMPORTANT)
[2.6.3-6.git4391e5c]
- Update the fix for CVE-2019-3816 Resolves: #1668657
- Remove Dist Tag from the oldest changelog entry
[2.6.3-5.git4391e5c]
- Fix CVE-2019-3816 Resolves: #1668657
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
libwsman-devel
2.6.3-6.git4391e5c.el7_6
libwsman1
2.6.3-6.git4391e5c.el7_6
openwsman-client
2.6.3-6.git4391e5c.el7_6
openwsman-perl
2.6.3-6.git4391e5c.el7_6
openwsman-python
2.6.3-6.git4391e5c.el7_6
openwsman-ruby
2.6.3-6.git4391e5c.el7_6
openwsman-server
2.6.3-6.git4391e5c.el7_6
Oracle Linux x86_64
libwsman-devel
2.6.3-6.git4391e5c.el7_6
libwsman1
2.6.3-6.git4391e5c.el7_6
openwsman-client
2.6.3-6.git4391e5c.el7_6
openwsman-perl
2.6.3-6.git4391e5c.el7_6
openwsman-python
2.6.3-6.git4391e5c.el7_6
openwsman-ruby
2.6.3-6.git4391e5c.el7_6
openwsman-server
2.6.3-6.git4391e5c.el7_6
Связанные CVE
Связанные уязвимости
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
Openwsman, versions up to and including 2.6.9, are vulnerable to arbit ...