Login-Name Passwort


Sicherheit: Ausführen beliebiger Kommandos in OpenSLP
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in OpenSLP
ID: FEDORA-2017-ffc47d48ec
Distribution: Fedora
Plattformen: Fedora 26
Datum: Sa, 1. April 2017, 21:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7567
Applikationen: OpenSLP


Name        : openslp
Product : Fedora 26
Version : 2.0.0
Release : 12.fc26
URL : http://sourceforge.net/projects/openslp/
Summary : Open implementation of Service Location Protocol V2
Description :
Service Location Protocol is an IETF standards track protocol that
provides a framework to allow networking applications to discover the
existence, location, and configuration of networked services in
enterprise networks.

OpenSLP is an open source implementation of the SLPv2 protocol as defined
by RFC 2608 and RFC 2614.

Update Information:

Fix possible overflow in SLPFoldWhiteSpace, CVE-2016-7567

[ 1 ] Bug #1379988 - CVE-2016-7567 openslp: memory corruption due to possible
overflow in SLPFoldWhiteSpace in common/slp_compare.c [fedora-all]

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade openslp' at the command line.
For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Unterstützer werden
Neue Nachrichten