Vulnerability Description
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libslirp Project | Libslirp | 4.1.0 |
| Debian | Debian Linux | 8.0 |
| Opensuse | Leap | 15.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.htmlMailing ListThird Party Advisory
- https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0Release NotesThird Party Advisory
- https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b281PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/03/msg00015.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/03/msg00017.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/02/msg00012.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202003-66Third Party Advisory
- https://security.netapp.com/advisory/ntap-20201001-0002/Third Party Advisory
- https://usn.ubuntu.com/4283-1/Third Party Advisory
- https://www.debian.org/security/2020/dsa-4733Third Party Advisory
- https://www.openwall.com/lists/oss-security/2020/02/06/2Mailing ListPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.htmlMailing ListThird Party Advisory
- https://gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0Release NotesThird Party Advisory
- https://gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b281PatchThird Party Advisory
FAQ
What is CVE-2020-8608?
CVE-2020-8608 is a vulnerability with a CVSS score of 5.6 (MEDIUM). In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
How severe is CVE-2020-8608?
CVE-2020-8608 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8608?
Check the references section above for vendor advisories and patch information. Affected products include: Libslirp Project Libslirp, Debian Debian Linux, Opensuse Leap.