Package        : slirp
Version        : 1:1.0.17-7+deb8u2
CVE ID         : CVE-2020-8608

It was discovered that there was a buffer overflow vulnerability in
slirp, a SLIP/PPP emulator for using a dial up shell account. This
was caused by the incorrect usage of return values from snprintf(3).

For Debian 8 "Jessie", this issue has been fixed in slirp version
1:1.0.17-7+deb8u2.

We recommend that you upgrade your slirp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-2142-1: slirp security update

March 13, 2020
It was discovered that there was a buffer overflow vulnerability in slirp, a SLIP/PPP emulator for using a dial up shell account

Summary

We recommend that you upgrade your slirp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : slirp
Version : 1:1.0.17-7+deb8u2
CVE ID : CVE-2020-8608

Related News