Description
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2142-1 | slirp security update |
Debian DLA |
DLA-2144-1 | qemu security update |
Debian DLA |
DLA-2288-1 | qemu security update |
Debian DLA |
DLA-2551-1 | slirp security update |
Debian DSA |
DSA-4733-1 | qemu security update |
EUVD |
EUVD-2020-29456 | In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code. |
Ubuntu USN |
USN-4283-1 | QEMU vulnerabilities |
Ubuntu USN |
USN-4632-1 | SLiRP vulnerabilities |
Ubuntu USN |
USN-7094-1 | QEMU vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Libslirp Project
Subscribe
Libslirp
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Advanced Virtualization
Subscribe
Enterprise Linux
Subscribe
Openshift
Subscribe
Openstack
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras Other
Subscribe
Rhev Manager
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:03:46.311Z
Reserved: 2020-02-04T00:00:00.000Z
Link: CVE-2020-8608
No data.
Status : Modified
Published: 2020-02-06T17:15:14.723
Modified: 2024-11-21T05:39:07.170
Link: CVE-2020-8608
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN