UbuntuUpdates.org

Package "openwsman"

Name: openwsman

Description:

Open Web Services Manager

Latest version: 2.4.3-0ubuntu4.1
Release: trusty (14.04)
Level: updates
Repository: universe
Homepage: http://sourceforge.net/projects/openwsman/

Links


Download "openwsman"


Other versions of "openwsman" in Trusty

Repository Area Version
base universe 2.4.3-0ubuntu4
security universe 2.4.3-0ubuntu4.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.4.3-0ubuntu4.1 2014-06-16 16:06:47 UTC

  openwsman (2.4.3-0ubuntu4.1) trusty-security; urgency=low

  * SECURITY UPDATE: Add security fixes from upstream openwsman (LP: #1319089)
    - debian/patches/ws-xml-make-default-prefix-buff-overflow-fix.patch:
      ws_xml_make_default_prefix() can overflow buf parameter via sprintf()
    - debian/patches/wsmc-create-request-fix-buff-overflow.patch:
      wsmc_create_request() potential buf[20] overflow via WSMAN_ACTION_RENEW
    - debian/patches/LocalSubscriptionOpUpdate-fix-fopen.patch:
      address LocalSubscriptionOpUpdate() unchecked fopen()
    - debian/patches/wsman-get-fault-status-sanity-guard-fix.patch:
      Fix incorrect order of sanity guards in wsman_get_fault_status_from_doc()
    - debian/patches/mem-allocation-wsman-init-plugins-fix.patch:
      Fix unchecked memory allocation in wsman_init_plugins(), p->ifc
    - debian/patches/mem-allocation-mem-double-newptr-fix.patch:
      Fix unchecked memory allocation in mem_double(), newptr
    - debian/patches/mem-allocation-dictionary-new-fix.patch:
      Fix unchecked memory allocation in dictionary_new(), d, d->val, d->key,
      d->hash
    - debian/patches/mem-allocation-u-error-new-fix.patch:
      Fix unchecked memory allocation in u_error_new(), *error
    - debian/patches/remove-unsafe-debug-call-from-sighup-handler.patch:
      sighup_handler() in wsmand.c use of unsafe functions in a signal handler
    - debian/patches/SHA512-password-fixes.patch:
      Support SHA512 password encoding, use safe_cmp to prevent brute-force
      attacks
    - debian/patches/increase-password-upper-limit.patch:
      increase password upper limit to 128 characters (from 64)
 -- Kent Baxley <email address hidden> Fri, 06 Jun 2014 12:55:02 -0500

1319089 Add security fixes from upstream



About   -   Send Feedback to @ubuntu_updates