{"affected":[{"ecosystem_specific":{"binaries":[{"openslp":"2.0.0-6.3.1","openslp-32bit":"2.0.0-6.3.1","openslp-devel":"2.0.0-6.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"openslp","purl":"pkg:rpm/suse/openslp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.0-6.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openslp-server":"2.0.0-6.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15","name":"openslp","purl":"pkg:rpm/suse/openslp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.0-6.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openslp fixes the following issues:\n\n- CVE-2017-17833: Prevent heap-related memory corruption issue which may have\n  manifested itself as a denial-of-service or a remote code-execution\n  vulnerability (bsc#1090638)\n- Prevent out of bounds reads in message parsing\n","id":"SUSE-SU-2018:1917-1","modified":"2018-07-09T09:57:19Z","published":"2018-07-09T09:57:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181917-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1090638"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-17833"}],"related":["CVE-2017-17833"],"summary":"Security update for openslp","upstream":["CVE-2017-17833"]}