Bug 941137 - (CVE-2015-5177) VUL-0: CVE-2015-5177: openslp: double free in SLPDProcessMessage()
(CVE-2015-5177)
VUL-0: CVE-2015-5177: openslp: double free in SLPDProcessMessage()
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Michael Schröder
Security Team bot
https://smash.suse.de/issue/120003/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-08-10 12:51 UTC by Alexander Bergmann
Modified: 2015-08-10 13:28 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2015-08-10 12:51:21 UTC
CVE-2015-5177 via redhat:

-----------------------
A double free flaw was found in openslp's SLPDProcessMessage() function. A crafted package could cause openslp to crash.

This flaw only affects version 1.2.1 of openslp, which is only shipped in EPEL 5. Version 2.0.0 is not affected.

OpenSLP is not actively maintained upstream so patches are not available.

Acknowledgements:

Red Hat would like to thank Qinghao Tang of QIHU 360 for reporting this issue.
-----------------------

SLE/openSUSE versions:

SLE-12:     openslp-2.0.0
SLE-11-SPx: openslp-1.2.0
SLE-10-SP3: openslp-1.2.0

openSUSE:Factory: openslp-2.0.0
openSUSE:13.2:    openslp-2.0.0
openSUSE:13.1:    openslp-1.2.0


References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5177
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5177
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-5177.html
Comment 1 Michael Schröder 2015-08-10 13:28:23 UTC
Oh well. Fortunately we already patch this ("openslp.knowndafree.diff"). The double free was reported by the OES guys and fixed in 2011.

See bug #667953