ALAS2-2019-1196


Amazon Linux 2 Security Advisory: ALAS-2019-1196
Advisory Release Date: 2019-04-26 01:29 Pacific
Severity: Important
References: CVE-2019-3816 

Issue Overview:

Earlier versions of Openwsman are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server. (CVE-2019-3816 )


Affected Packages:

openwsman


Issue Correction:
Run yum update openwsman to update your system.

New Packages:
aarch64:
    libwsman1-2.6.3-6.git4391e5c.amzn2.aarch64
    libwsman-devel-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-client-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-server-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-python-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-ruby-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-perl-2.6.3-6.git4391e5c.amzn2.aarch64
    openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.aarch64

i686:
    libwsman1-2.6.3-6.git4391e5c.amzn2.i686
    libwsman-devel-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-client-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-server-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-python-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-ruby-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-perl-2.6.3-6.git4391e5c.amzn2.i686
    openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.i686

src:
    openwsman-2.6.3-6.git4391e5c.amzn2.src

x86_64:
    libwsman1-2.6.3-6.git4391e5c.amzn2.x86_64
    libwsman-devel-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-client-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-server-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-python-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-ruby-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-perl-2.6.3-6.git4391e5c.amzn2.x86_64
    openwsman-debuginfo-2.6.3-6.git4391e5c.amzn2.x86_64