SUSE: 2019:13981-1 important: openwsman
Summary
This update for openwsman fixes the following issues: Security issues fixed: - CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623). - CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite loop which leads to Denial of Service (bsc#1122623). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-openwsman-13981=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-openwsman-13981=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-openwsman-13981=1 Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libwsman-devel-2.2.3-0.16.8.1 openwsman-python-2.2.3-0.16.8.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libwsman1-2.2.3-0.16.8.1 openwsman-client-2.2.3-0.16.8.1 openwsman-server-2.2.3-0.16.8.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): openwsman-debuginfo-2.2.3-0.16.8.1 openwsman-debugsource-2.2.3-0.16.8.1
References
#1122623
Cross- CVE-2019-3816 CVE-2019-3833
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
https://www.suse.com/security/cve/CVE-2019-3816.html
https://www.suse.com/security/cve/CVE-2019-3833.html
https://bugzilla.suse.com/1122623