Package: libslirp / 4.4.0-1+deb11u2
Metadata
| Package | Version | Patches format |
|---|---|---|
| libslirp | 4.4.0-1+deb11u2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| add mtod_check.patch | (download) |
src/mbuf.c |
11 11 + 0 - 0 ! |
add mtod_check() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Recent security issues demonstrate the lack of safety care when casting a mbuf to a particular structure type. At least, it should check that the buffer is large enough. The following patches will make use of this function. Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
| bootp limit vendor area to input packet CVE 2021 3592.patch | (download) |
src/bootp.c |
26 15 + 11 - 0 ! |
bootp: limit vendor-specific area to input packet memory buffer MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989993 sizeof(bootp_t) currently holds DHCP_OPT_LEN. Remove this optional field from the structure, to help with the following patch checking for minimal header size. Modify the bootp_reply() function to take the buffer boundaries and avoiding potential buffer overflow. Related to CVE-2021-3592. https://gitlab.freedesktop.org/slirp/libslirp/-/issues/44 Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
| fix DHCP broken in libslirp v4.6.0.patch | (download) |
src/bootp.c |
4 3 + 1 - 0 ! |
fix "dhcp broken in libslirp v4.6.0" Comment: this fixes "bootp: limit vendor-specific area to input packet memory buffer" commit Fix issue 48 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> |
| bootp check bootp_input buffer size CVE 2021 3592.patch | (download) |
src/bootp.c |
4 2 + 2 - 0 ! |
bootp: check bootp_input buffer size MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989993 Fixes: CVE-2021-3592 Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/44 Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
| tftp check tftp_input buffer size CVE 2021 3595.patch | (download) |
src/tftp.c |
6 5 + 1 - 0 ! |
tftp: check tftp_input buffer size MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989996 Fixes: CVE-2021-3595 Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/46 Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
| tftp introduce a header structure CVE 2021 3595.patch | (download) |
src/tftp.c |
60 31 + 29 - 0 ! |
tftp: introduce a header structure MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989996 Instead of using a composed structure and potentially reading past the |
| udp check upd_input buffer size CVE 2021 3594.patch | (download) |
src/udp.c |
5 4 + 1 - 0 ! |
udp: check upd_input buffer size MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989995 Fixes: CVE-2021-3594 Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/47 Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
| upd6 check udp6_input buffer size CVE 2021 3593.patch | (download) |
src/udp6.c |
5 4 + 1 - 0 ! |
upd6: check udp6_input buffer size MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Bug-Debian: https://bugs.debian.org/989994 Fixes: CVE-2021-3593 Fixes: https://gitlab.freedesktop.org/slirp/libslirp/-/issues/45 Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com> |
