ALT-PU-2020-1463-1
Closed vulnerabilities
BDU:2020-04502
Уязвимость компонента tcp_subr.c библиотеки TCP-IP эмулятора Libslirp, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании]
BDU:2021-00071
Уязвимость функции zrle_compress_data программного обеспечения для эмуляции аппаратного обеспечения различных платформ QEMU, связанная с неправильным освобождением памяти перед удалением последней ссылки, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20382
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://usn.ubuntu.com/4372-1/
- https://www.debian.org/security/2020/dsa-4665
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://usn.ubuntu.com/4372-1/
- https://www.debian.org/security/2020/dsa-4665
Modified: 2024-11-21
CVE-2020-8608
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0
- https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843
- https://lists.debian.org/debian-lts-announce/2020/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html
- https://security.gentoo.org/glsa/202003-66
- https://security.netapp.com/advisory/ntap-20201001-0002/
- https://usn.ubuntu.com/4283-1/
- https://www.debian.org/security/2020/dsa-4733
- https://www.openwall.com/lists/oss-security/2020/02/06/2
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0
- https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843
- https://lists.debian.org/debian-lts-announce/2020/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.debian.org/debian-lts-announce/2021/02/msg00012.html
- https://security.gentoo.org/glsa/202003-66
- https://security.netapp.com/advisory/ntap-20201001-0002/
- https://usn.ubuntu.com/4283-1/
- https://www.debian.org/security/2020/dsa-4733
- https://www.openwall.com/lists/oss-security/2020/02/06/2