|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2016-0162|
|Summary:||Mageia Linux Local Security Checks mgasa-2016-0162|
Mageia Linux Local Security Checks mgasa-2016-0162
Updated jenkins-remoting packages fix security vulnerability: Jenkins has several API endpoints that allow low-privilege users to POST XML files that then get deserialized by Jenkins. Maliciously crafted XML files sent to these API endpoints could result in arbitrary code execution. (SECURITY-247 / CVE-2016-0792)
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2016-0792|
RedHat Security Advisories: RHSA-2016:0711
RedHat Security Advisories: RHSA-2016:1773
|Copyright||Copyright (C) 2016 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.