[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2551-1] slirp security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2551-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
February 09, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : slirp
Version        : 1:1.0.17-8+deb9u1
CVE ID         : CVE-2020-7039 CVE-2020-8608


Two issues have been found in slirp, a SLIP/PPP emulator using a dial up shell account.

CVE-2020-7039

    Due to mismanagement of memory, a heap-based buffer overflow or
    other out-of-bounds access might happen, which can lead to a DoS
    or potential execute arbitrary code.

CVE-2020-8608

    Prevent a buffer overflow vulnerability due to incorrect usage
    of return values from snprintf.


For Debian 9 stretch, these problems have been fixed in version
1:1.0.17-8+deb9u1.

We recommend that you upgrade your slirp packages.

For the detailed security status of slirp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/slirp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=j1K9
-----END PGP SIGNATURE-----


Reply to: