CNNVD-ID编号 | CNNVD-202002-197 |
CVE编号 | CVE-2020-8608 |
发布时间 | 2020-02-06 |
更新时间 | 2020-12-21 |
漏洞类型 | 其他 |
漏洞来源 | N/A |
危险等级 | 中危 |
威胁类型 | 远程 |
厂 商 | N/A |
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)软件开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。libslirp是一款用于在虚拟机管理程序中管理虚拟网络服务的通用TCP-IP模拟器。
libslirp 4.1.0版本(在QEMU 4.2.0版本中使用)中存在安全漏洞,该漏洞源于tcp_sub .c文件错误地使用了‘snprintf’函数的返回值。远程攻击者可利用该漏洞造成拒绝服务或执行任意代码。
目前厂商已发布升级了libslirp 安全漏洞的补丁,libslirp 安全漏洞的补丁获取链接:
https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0
来源:GENTOO
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/03/msg00015.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2020/suse-su-20202234-1
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
来源:MISC
链接:https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0
来源:UBUNTU
来源:MISC
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html
来源:MISC
链接:https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
来源:DEBIAN
来源:CONFIRM
来源:www.ibm.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157147/Red-Hat-Security-Advisory-2020-1379-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160044/Ubuntu-Security-Notice-USN-4632-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158253/Red-Hat-Security-Advisory-2020-2774-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158350/Red-Hat-Security-Advisory-2020-2844-01.html
来源:www.nsfocus.net
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157888/Red-Hat-Security-Advisory-2020-2342-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157066/Red-Hat-Security-Advisory-2020-1300-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158492/Red-Hat-Security-Advisory-2020-3040-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156803/Red-Hat-Security-Advisory-2020-0889-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158210/Red-Hat-Security-Advisory-2020-2730-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/QEMU-out-of-bounds-memory-reading-via-snprintf-31540
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157169/Red-Hat-Security-Advisory-2020-1403-01.html
暂无