You are here
Home > Preporuke > Ranjivost programskog paketa openvas-gsa

Ranjivost programskog paketa openvas-gsa

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-afdedc8da9
2016-05-01 19:39:42.660814
——————————————————————————–

Name : openvas-libraries
Product : Fedora 23
Version : 8.0.7
Release : 2.fc23
URL : http://www.openvas.org
Summary : Support libraries for Open Vulnerability Assessment (OpenVAS) Scanner
Description :
openvas-libraries is the base library for the OpenVAS network
security scanner.

——————————————————————————–
Update Information:

Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926
——————————————————————————–
References:

[ 1 ] Bug #1300683 – CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command
https://bugzilla.redhat.com/show_bug.cgi?id=1300683
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openvas-libraries’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-afdedc8da9
2016-05-01 19:39:42.660814
——————————————————————————–

Name : openvas-scanner
Product : Fedora 23
Version : 5.0.5
Release : 3.fc23
URL : http://www.openvas.org
Summary : Open Vulnerability Assessment (OpenVAS) Scanner
Description :
Scanner module for the Open Vulnerability Assessment System (OpenVAS).

——————————————————————————–
Update Information:

Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926
——————————————————————————–
References:

[ 1 ] Bug #1300683 – CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command
https://bugzilla.redhat.com/show_bug.cgi?id=1300683
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openvas-scanner’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-afdedc8da9
2016-05-01 19:39:42.660814
——————————————————————————–

Name : openvas-gsa
Product : Fedora 23
Version : 6.0.10
Release : 3.fc23
URL : http://www.openvas.org
Summary : Greenbone Security Assistant (GSA) is GUI to the OpenVAS
Description :
The Greenbone Security Assistant (GSA) is a lean web service offering a user
web interface for the Open Vulnerability Assessment System (OpenVAS).
The GSA uses XSL transformation style-sheets that converts OMP responses
from the OpenVAS infrastructure into presentable HTML.

——————————————————————————–
Update Information:

Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926
——————————————————————————–
References:

[ 1 ] Bug #1300683 – CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command
https://bugzilla.redhat.com/show_bug.cgi?id=1300683
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openvas-gsa’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-afdedc8da9
2016-05-01 19:39:42.660814
——————————————————————————–

Name : openvas-cli
Product : Fedora 23
Version : 1.4.4
Release : 1.fc23
URL : http://www.openvas.org
Summary : Command-line tool to drive OpenVAS Manager
Description :
OpenVAS CLI contains the command line tool “omp” which allows to create batch
processes to drive OpenVAS Manager.

——————————————————————————–
Update Information:

Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926
——————————————————————————–
References:

[ 1 ] Bug #1300683 – CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command
https://bugzilla.redhat.com/show_bug.cgi?id=1300683
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openvas-cli’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-afdedc8da9
2016-05-01 19:39:42.660814
——————————————————————————–

Name : openvas-manager
Product : Fedora 23
Version : 6.0.8
Release : 2.fc23
URL : http://www.openvas.org
Summary : Manager Module for the Open Vulnerability Assessment System (OpenVAS)
Description :
The OpenVAS Manager is the central service that consolidates plain vulnerability
scanning into a full vulnerability management solution. The Manager controls the
Scanner via OTP and itself offers the XML-based, stateless OpenVAS Management
Protocol (OMP). All intelligence is implemented in the Manager so that it is
possible to implement various lean clients that will behave consistently e.g.
with regard to filtering or sorting scan results. The Manager also controls
a SQL database (sqlite-based) where all configuration and scan result data is
centrally stored.

——————————————————————————–
Update Information:

Bump to latest upstream bugfix releases. Contains Security fix for CVE-2016-1926
——————————————————————————–
References:

[ 1 ] Bug #1300683 – CVE-2016-1926 openvas-gsa: XSS vulnerability due to improper handling of the parameters of get_aggregate command
https://bugzilla.redhat.com/show_bug.cgi?id=1300683
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openvas-manager’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2016-05-0002-ADV
CveCVE-2016-1926
ID izvornikaFEDORA-2016-afdedc8da9
Proizvodopenvas
Izvorhttp://www.redhat.com
Top
More in Preporuke
Nadogradnja za java-1.7.0-ibm i java-1.7.1-ibm

Izdana je nadogradnja koja otklanja ranjivosti u radu programskog paketa java-1.7.0-ibm i java-1.7.1-ibm za RHEL 5, 6 i 7. Ranjivosti...

Close