ELSA-2020-0199

ELSA-2020-0199 - openslp security update

Type:SECURITY
Impact:CRITICAL
Release Date:2020-01-22

Description


[2.0.0-4]
- Fix a heap-based buffer overflow vulnerability leading to
remote code execution, CVE-2019-5544
Resolves: #1788447


Related CVEs


CVE-2019-5544

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openslp-2.0.0-4.el6_10.src.rpmad1a0946a18ba0d1f2a7a62b216a6c82ff916d19ed8255a4a212c2a2bbee1c09-ol6_i386_latest
openslp-2.0.0-4.el6_10.src.rpmad1a0946a18ba0d1f2a7a62b216a6c82ff916d19ed8255a4a212c2a2bbee1c09-ol6_u10_i386_patch
openslp-2.0.0-4.el6_10.i686.rpmdb37f60bdffae006b9f143294f4f42ebcd26d6f1fa86d020695346a89745a7af-ol6_i386_latest
openslp-2.0.0-4.el6_10.i686.rpmdb37f60bdffae006b9f143294f4f42ebcd26d6f1fa86d020695346a89745a7af-ol6_u10_i386_patch
openslp-devel-2.0.0-4.el6_10.i686.rpmf6fc70f05932e0836b44469e9accac2853f3ab27518b211ee2364f06a118dc36-ol6_i386_latest
openslp-devel-2.0.0-4.el6_10.i686.rpmf6fc70f05932e0836b44469e9accac2853f3ab27518b211ee2364f06a118dc36-ol6_u10_i386_patch
openslp-server-2.0.0-4.el6_10.i686.rpmd885aa0062157b81660b5856bf0d14cf41dc1ed92ef22e2e894c0b191895f110-ol6_i386_latest
openslp-server-2.0.0-4.el6_10.i686.rpmd885aa0062157b81660b5856bf0d14cf41dc1ed92ef22e2e894c0b191895f110-ol6_u10_i386_patch
Oracle Linux 6 (x86_64) openslp-2.0.0-4.el6_10.src.rpmad1a0946a18ba0d1f2a7a62b216a6c82ff916d19ed8255a4a212c2a2bbee1c09-ol6_u10_x86_64_patch
openslp-2.0.0-4.el6_10.src.rpmad1a0946a18ba0d1f2a7a62b216a6c82ff916d19ed8255a4a212c2a2bbee1c09-ol6_x86_64_latest
openslp-2.0.0-4.el6_10.i686.rpmdb37f60bdffae006b9f143294f4f42ebcd26d6f1fa86d020695346a89745a7af-ol6_u10_x86_64_patch
openslp-2.0.0-4.el6_10.i686.rpmdb37f60bdffae006b9f143294f4f42ebcd26d6f1fa86d020695346a89745a7af-ol6_x86_64_latest
openslp-2.0.0-4.el6_10.x86_64.rpm1361e5957a2d515c39988b77ef4148283cc8eb08b056aadab6f7ed965ff851a7-ol6_u10_x86_64_patch
openslp-2.0.0-4.el6_10.x86_64.rpm1361e5957a2d515c39988b77ef4148283cc8eb08b056aadab6f7ed965ff851a7-ol6_x86_64_latest
openslp-devel-2.0.0-4.el6_10.i686.rpmf6fc70f05932e0836b44469e9accac2853f3ab27518b211ee2364f06a118dc36-ol6_u10_x86_64_patch
openslp-devel-2.0.0-4.el6_10.i686.rpmf6fc70f05932e0836b44469e9accac2853f3ab27518b211ee2364f06a118dc36-ol6_x86_64_latest
openslp-devel-2.0.0-4.el6_10.x86_64.rpm1b0ecd50fe225e58464094236bccade63e7f8657ea57dcbe4bc663b58bce73e1-ol6_u10_x86_64_patch
openslp-devel-2.0.0-4.el6_10.x86_64.rpm1b0ecd50fe225e58464094236bccade63e7f8657ea57dcbe4bc663b58bce73e1-ol6_x86_64_latest
openslp-server-2.0.0-4.el6_10.x86_64.rpm6150ea4589af816dff511aa9aabdf3862e5e5989786b9addd81694a9253c3846-ol6_u10_x86_64_patch
openslp-server-2.0.0-4.el6_10.x86_64.rpm6150ea4589af816dff511aa9aabdf3862e5e5989786b9addd81694a9253c3846-ol6_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete