Описание
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
libslirp | fixed | 4.2.0-1 | package | |
qemu | fixed | 1:4.1-2 | package | |
qemu-kvm | removed | package | ||
slirp | fixed | 1:1.0.17-11 | package | |
slirp | fixed | 1:1.0.17-8+deb10u1 | buster | package |
slirp4netns | fixed | 1.0.1-1 | package | |
slirp4netns | no-dsa | buster | package |
Примечания
https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843
https://gitlab.freedesktop.org/slirp/libslirp/commit/30648c03b27fb8d9611b723184216cd3174b6775
qemu 1:4.1-2 switched to system libslirp, marking that version as fixed.
slirp4netns 1.0.1-1 switched to system libslirp, marking that version as fixed.
https://github.com/rootless-containers/slirp4netns/security/advisories/GHSA-p3hx-89v2-4r99
EPSS
Связанные уязвимости
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
EPSS