Debian alert DLA-2551-1 (slirp)
From: | Thorsten Alteholz <debian@alteholz.de> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 2551-1] slirp security update | |
Date: | Tue, 09 Feb 2021 20:56:45 +0000 | |
Message-ID: | <alpine.DEB.2.21.2102092054270.7933@postfach.intern.alteholz.me> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2551-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Thorsten Alteholz February 09, 2021 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : slirp Version : 1:1.0.17-8+deb9u1 CVE ID : CVE-2020-7039 CVE-2020-8608 Two issues have been found in slirp, a SLIP/PPP emulator using a dial up shell account. CVE-2020-7039 Due to mismanagement of memory, a heap-based buffer overflow or other out-of-bounds access might happen, which can lead to a DoS or potential execute arbitrary code. CVE-2020-8608 Prevent a buffer overflow vulnerability due to incorrect usage of return values from snprintf. For Debian 9 stretch, these problems have been fixed in version 1:1.0.17-8+deb9u1. We recommend that you upgrade your slirp packages. For the detailed security status of slirp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/slirp Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmAi9w1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEfBDQ//bxMDkVDJT9fYMpFJGb8EHVMYJPBJSzg+XI/Fb6V5M79CAR7nRvcwIkHo bmZ04gxmhDy1ImvnAS+uj1qEE+TMpIHgDBgfr+Ua92Hut5rEkeIKcUCqyB3bihDl eXjffAuawjhV1f9yIKqUxviduY0xwZwU8A35x3bV+SfeKcOxqhBIIduvWr4Il4Z4 QSMUNsxCY+WyJ83g1NJyQyJJ2WwU9NUL+A8LiEwyNIg/13vt4TGEVb50snPYuHSV LgamAEtkqR4ZcCwGiuvWlGDpnScyS619iga+pedhk4GhSuDW4P84W5jOrHTm6xZ9 safiuXTw5Bg1NqnXOl1UFu63rnpc5wXYAKad8vVthVZu5pno+9+rlVMyLkcPi5xI joSzPFtbvWuep6bJmbz/qwVjvDISDJEh504FbVPzpfosPoI48ASfb5WdwYMMfvyC rpDCIiU/b7/pq0f0Q8rQkHrWPQsaZjOBJ2Gk+rP7Il/tUO6q83no81sGzUcPRWzN 4poCNeudCW5gCrNcd1bkGz9Gg1CK6+VZvq677ZtJL+UM6u0YPsA6yXVOkLwrWuuA dr/P8NScCQ3ofyeBdoaIqhWzE5onyhIFX/VVhWMe0xXrm/wsNEZm8srdzEHqqd9k aEVdohKyrSHrxZaG4Rt+dLPnKc8zFfw2qX/pST8UkYPBXKB6+nQ= =j1K9 -----END PGP SIGNATURE-----