ALT-PU-2018-2751-1
Closed vulnerabilities
BDU:2018-01499
Уязвимость пакета openslp-dfsg, связаннная с ошибками работы с памятью, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность
Modified: 2024-11-21
CVE-2012-4428
openslp: SLPIntersectStringList()' Function has a DoS vulnerability
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
Modified: 2025-04-20
CVE-2016-4912
The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
- http://www.openwall.com/lists/oss-security/2016/05/18/6
- http://www.securitytracker.com/id/1035916
- https://bugzilla.redhat.com/show_bug.cgi?id=1329295
- https://security.gentoo.org/glsa/201707-05
- http://www.openwall.com/lists/oss-security/2016/05/18/6
- http://www.securitytracker.com/id/1035916
- https://bugzilla.redhat.com/show_bug.cgi?id=1329295
- https://security.gentoo.org/glsa/201707-05
Modified: 2025-04-20
CVE-2016-7567
Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
- http://www.openwall.com/lists/oss-security/2016/09/27/4
- http://www.openwall.com/lists/oss-security/2016/09/28/1
- http://www.securityfocus.com/bid/93186
- https://security.gentoo.org/glsa/201707-05
- https://sourceforge.net/p/openslp/mercurial/ci/34fb3aa5e6b4997fa21cb614e480de36da5dbc9a/
- https://www.exploit-db.com/exploits/45804/
- http://www.openwall.com/lists/oss-security/2016/09/27/4
- http://www.openwall.com/lists/oss-security/2016/09/28/1
- http://www.securityfocus.com/bid/93186
- https://security.gentoo.org/glsa/201707-05
- https://sourceforge.net/p/openslp/mercurial/ci/34fb3aa5e6b4997fa21cb614e480de36da5dbc9a/
- https://www.exploit-db.com/exploits/45804/
Modified: 2024-11-21
CVE-2017-17833
OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
- http://support.lenovo.com/us/en/solutions/LEN-18247
- https://access.redhat.com/errata/RHSA-2018:2240
- https://access.redhat.com/errata/RHSA-2018:2308
- https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html
- https://security.gentoo.org/glsa/202005-12
- https://sourceforge.net/p/openslp/mercurial/ci/151f07745901cbdba6e00e4889561b4083250da1/
- https://usn.ubuntu.com/3708-1/
- http://support.lenovo.com/us/en/solutions/LEN-18247
- https://access.redhat.com/errata/RHSA-2018:2240
- https://access.redhat.com/errata/RHSA-2018:2308
- https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html
- https://security.gentoo.org/glsa/202005-12
- https://sourceforge.net/p/openslp/mercurial/ci/151f07745901cbdba6e00e4889561b4083250da1/
- https://usn.ubuntu.com/3708-1/
Closed bugs
Gssproxy tests failed against libopenslp-2.0.0-alt1