Bug 25841 - openslp new security issue CVE-2019-5544
Summary: openslp new security issue CVE-2019-5544
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2019-12-07 16:37 CET by David Walser
Modified: 2020-02-09 20:14 CET (History)
6 users (show)

See Also:
Source RPM: openslp-2.0.0-10.mga7.src.rpm
CVE:
Status comment: Patch is available


Attachments

Description David Walser 2019-12-07 16:37:46 CET
A security issue in openslp has been announced on December 6:
https://www.openwall.com/lists/oss-security/2019/12/06/1

A patch to fix it is included in the message above.

Mageia 7 is also affected.
David Walser 2019-12-07 16:38:04 CET

Whiteboard: (none) => MGA7TOO

Comment 1 Lewis Smith 2019-12-07 18:15:54 CET
Assign/CC to Johnny & Stig as most recent committers. No registered maintainer.

CC: (none) => smelror
Assignee: bugsquad => cooker

Comment 2 David Walser 2019-12-14 18:53:23 CET
Debian-LTS has issued an advisory for this on December 8:
https://www.debian.org/lts/security/2019/dla-2025
Comment 3 David Walser 2019-12-19 16:10:18 CET
RedHat has issued an advisory for this on December 16:
https://access.redhat.com/errata/RHSA-2019:4240
Comment 4 David Walser 2019-12-27 05:22:54 CET
Fedora has issued an advisory for this on December 18:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZPXXJZLPLAQULBCJVI5NNWZ3PGWXGXWG/

Severity: normal => critical

David Walser 2020-01-14 17:42:29 CET

Status comment: (none) => Patch is available

Comment 5 Johnny A. Solbu 2020-01-31 10:22:23 CET
I have uploaded a patched mga7 package that fixes this.
(I have no idea how you test this)


Suggested advisory:
========================
A heap-based buffer overflow was discovered in OpenSLP in the way the slpd service processes URLs in service request messages. A remote unauthenticated attacker could register a service with a specially crafted URL that, when used during a service request message, would trigger the flaw and cause the program to crash or to remotely execute code with the privileges of the slpd service.

This update fixes this.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544
https://www.openwall.com/lists/oss-security/2019/12/06/1

Updated packages in 7/core/updates_testing
========================
openslp-2.0.0-10.1.mga7

Source RPM:
openslp-2.0.0-10.1.mga7.src.rpm

Assignee: cooker => qa-bugs
Status: NEW => ASSIGNED

Comment 6 Johnny A. Solbu 2020-01-31 10:29:42 CET
Fixed in cauldron.

CC: (none) => cooker

Thomas Backlund 2020-01-31 16:04:25 CET

Whiteboard: MGA7TOO => (none)
CC: (none) => tmb
Version: Cauldron => 7

Comment 7 Herman Viaene 2020-02-07 14:36:54 CET
MGA7-64 Plasma on Lenovo B50
No installation issues.
Ref bug 7081 for tests.
# systemctl -l status slpd
● slpd.service - LSB: OpenSLP daemon for the Service Location Protocol
   Loaded: loaded (/etc/rc.d/init.d/slpd; generated)
   Active: inactive (dead)
     Docs: man:systemd-sysv-generator(8)
# systemctl -l start slpd
# systemctl -l status slpd
● slpd.service - LSB: OpenSLP daemon for the Service Location Protocol
   Loaded: loaded (/etc/rc.d/init.d/slpd; generated)
   Active: active (running) since Fri 2020-02-07 14:33:46 CET; 3s ago
     Docs: man:systemd-sysv-generator(8)
  Process: 19721 ExecStart=/etc/rc.d/init.d/slpd start (code=exited, status=0/SUCCESS)
   Memory: 1.6M
   CGroup: /system.slice/slpd.service
           └─19737 /usr/sbin/slpd

feb 07 14:33:45 mach5.hviaene.thuis systemd[1]: Starting LSB: OpenSLP daemon for the Service Location Protocol...
feb 07 14:33:46 mach5.hviaene.thuis slpd[19721]: Starting slpd: Multicast Route Enabled[  OK  ]
feb 07 14:33:46 mach5.hviaene.thuis systemd[1]: Started LSB: OpenSLP daemon for the Service Location Protocol.
then
$ slptool findsrvs service:service-agent
service:service-agent://192.168.2.5,65535
which is OK0

Whiteboard: (none) => MGA7-64-OK
CC: (none) => herman.viaene

Comment 8 Thomas Andrews 2020-02-07 19:11:52 CET
Validating. Advisory in Comment 5.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Thomas Backlund 2020-02-09 19:05:23 CET

Keywords: (none) => advisory

Comment 9 Mageia Robot 2020-02-09 20:14:58 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0075.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.