First published: Thu Aug 06 2015(Updated: )
A double free flaw was found in openslp's SLPDProcessMessage() function. A crafted package could cause openslp to crash. This flaw only affects version 1.2.1 of openslp, which is only shipped in EPEL 5. Version 2.0.0 is not affected. OpenSLP is not actively maintained upstream so patches are not available. Acknowledgements: Red Hat would like to thank Qinghao Tang of QIHU 360 for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openslp-dfsg | ||
debian/1.2.1-10 | ||
debian/openslp-dfsg | <=1.2.1-7 | 1.2.1-7.8+deb6u1 1.2.1-9+deb7u1 1.2.1-10+deb8u1 1.2.1-11 |
OpenSLP | =1.2.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.