openslp is vulnerable to remote code execution. A heap-based buffer overflow in the ProcessSrvRqst()
function in slpd_process.c
allows an attacker to execute arbitrary code on the system.
www.openwall.com/lists/oss-security/2019/12/10/2
www.openwall.com/lists/oss-security/2019/12/11/2
www.vmware.com/security/advisories/VMSA-2019-0022.html
access.redhat.com/errata/RHSA-2019:4240
access.redhat.com/errata/RHSA-2020:0199
access.redhat.com/security/updates/classification/#critical
lists.fedoraproject.org/archives/list/[email protected]/message/DA3LYAJ2NRKMOZLZOQNDJ5TNQRFMWGHF/
lists.fedoraproject.org/archives/list/[email protected]/message/ZPXXJZLPLAQULBCJVI5NNWZ3PGWXGXWG/
security.gentoo.org/glsa/202005-12