UbuntuUpdates.org

Package "slpd"

Name: slpd

Description:

OpenSLP server (slpd)

Latest version: 1.2.1-11ubuntu0.16.04.2
Release: xenial (16.04)
Level: security
Repository: universe
Head package: openslp-dfsg
Homepage: http://www.openslp.org/

Links


Download "slpd"


Other versions of "slpd" in Xenial

Repository Area Version
base universe 1.2.1-11
updates universe 1.2.1-11ubuntu0.16.04.2

Changelog

Version: 1.2.1-11ubuntu0.16.04.2 2021-04-19 20:06:26 UTC

  openslp-dfsg (1.2.1-11ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: heap overflow vulnerability
    - debian/patches/CVE-2019-5544.patch: Prevent memcpy heap overflow in
      slpd_process.c.
    - debian/libslp1.symbols: Add RemainingBufferSpace@Base.
    - CVE-2019-5544

 -- Avital Ostromich <email address hidden> Tue, 13 Apr 2021 20:06:12 -0400

Source diff to previous version
CVE-2019-5544 OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Crit

Version: 1.2.1-11ubuntu0.16.04.1 2018-07-09 18:07:03 UTC

  openslp-dfsg (1.2.1-11ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS or code exec via double-free
    - debian/patches/CVE-2017-17833.patch: fix up local copy of pointer in
      slpd/slpd_process.c.
    - CVE-2017-17833
    - CVE-2018-12938

 -- Marc Deslauriers <email address hidden> Fri, 06 Jul 2018 13:15:34 -0400

CVE-2017-17833 OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or
CVE-2018-12938 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-17833. Reason: This candidate is a duplicate of CVE-2017-17833. Notes: All CV



About   -   Send Feedback to @ubuntu_updates