SCIENTIFIC-LINUX-ERRATA Archives

January 2020

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Farhan Ahmed <[log in to unmask]>
Reply To:
Date:
Wed, 22 Jan 2020 19:27:10 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (29 lines)
Synopsis:          Critical: openslp security update
Advisory ID:       SLSA-2020:0199-1
Issue Date:        2020-01-22
CVE Numbers:       CVE-2019-5544
--

Security Fix(es):

* openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c
leading to remote code execution (CVE-2019-5544)
--

SL6
  x86_64
    openslp-2.0.0-4.el6_10.i686.rpm
    openslp-2.0.0-4.el6_10.x86_64.rpm
    openslp-debuginfo-2.0.0-4.el6_10.i686.rpm
    openslp-debuginfo-2.0.0-4.el6_10.x86_64.rpm
    openslp-devel-2.0.0-4.el6_10.i686.rpm
    openslp-devel-2.0.0-4.el6_10.x86_64.rpm
    openslp-server-2.0.0-4.el6_10.x86_64.rpm
  i386
    openslp-2.0.0-4.el6_10.i686.rpm
    openslp-debuginfo-2.0.0-4.el6_10.i686.rpm
    openslp-devel-2.0.0-4.el6_10.i686.rpm
    openslp-server-2.0.0-4.el6_10.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2