RLSA-2020:4689

Source
https://errata.rockylinux.org/RLSA-2020:4689
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2020:4689.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2020:4689
Related
Published
2020-11-03T12:27:08Z
Modified
2023-02-02T14:10:06.334481Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Moderate: openwsman security update
Details

Openwsman is a project intended to provide an open source implementation of the Web Services Management specification (WS-Management) and to expose system management information on the Linux operating system using the WS-Management protocol. WS-Management is based on a suite of web services specifications and usage requirements that cover all system management aspects.

Security Fix(es):

  • openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / openwsman

Package

Name
openwsman
Purl
pkg:rpm/rocky-linux/openwsman?distro=rocky-linux-8-4-legacy&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.6.5-7.el8_3