Debian Patches

Status for slirp/1:1.0.17-11

Patch Description Author Forwarded Bugs Origin Last update
006-changelog-1.0.17.patch Add 1.0.17 upstream changelog Roberto Lumbreras <> no
007-debian-changes.patch Debian building changes Roberto Lumbreras <> no
005-use-snprintf.patch Use snprintf instead of sprintf Roberto Lumbreras <> no
001-update-man-fix-hyphens-as-minus.patch fix hyphens used instead of minus signs and update manpage Roberto Lumbreras <> no
002-fix-arguements.patch fix arguements spelling error Roberto Lumbreras <> no
003-socklen_t.patch Use addrlen as socklen_t instead of int Roberto Lumbreras <> no
004-compilation-warnings.patch Fix compilation warnings Roberto Lumbreras <> no
008-slirp-amd64-log-crash.patch Fix crash on amd64 when enabling file logging On amd64 architectures, slirp crashes immediately when file logging is
enabled with "log start". It happens at the first call to lprint after the
log file is opened and ready for logging. The reason is that the va_list
object "args" is used twice in that case, once at
lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
and once at
vfprintf(lfd, bptr2, args);
After the first call, args gets invalid because all arguments have been
read from the va_args structure. For some reason, this does not happen on
i386 versions. Maybe a real copy of args is created when the function is
called in i386.
Alexander Block <> no debian
009-i-hate-perl.patch Do not run MAKEPRO anymore mkpro is a nice perl script that used to regenerate all slirp prototypes
correctly in the past. It stopped working, maybe because a change in perl
and/or because it has a bug. I'm not a perl guru, and after wasting hours
of my time trying to decypher mkrpo and fixing that silly thing, I quit.
Slirp hasn't changed for years, so I think mkpro isn't very useful anyway.

Roberto Lumbreras <> no debian
010-fullbolt-fix.patch please apply "real full bolt" patch Even when compiled with "-DFULL_BOLT", slirp applies a small delay to
TCP ACKs, which results in the upload speed being capped to circa 46Kb/s.
Manfread Haertel published a tiny patch for this on the UML mailing list:

Manfred Haertel <Manfred.Haertel <at>> no debian
011-sizeof_ipv4.patch IPCP negotiation fails for 64-bit hosts Due to incorrect use of "sizeof(long)" in src/ppp/ipcp.c, a 64-bit host
may send back incorrect IPCP NAKs in response to a client sending an IPCP
configure request that includes DNS/WINS options.
The NAK response offers an incorrect IP address and no DNS IPs, which
eventually causes negotiation to fail.
Proposed solution is to change "sizeof (long)" to "sizeof (u_int32_t)" to
correctly match the length of IPV4 addresses.

Tueidj Traden <tueidj <at>> no debian
012_ipq64.patch fix crashes at startup in 64bit systems Due to the use of 32bit pointers slirp crashes at startup
Thanks to Fernando Toledo for the fix:

Roberto Lumbreras <> no debian
013_hurd.patch make it compile on GNU Hurd Quick and dirty fix to make it compile on GNU Hurd.

Roberto Lumbreras <> no
014_CVE-2020-7039.patch CVE-2020-7039 fix .
tcp_emu: Fix oob access
The main loop only checks for one available byte, while we sometimes need two bytes.
slirp: use correct size while emulating IRC commands
While emulating IRC DCC commands, tcp_emu() uses 'mbuf' size
'm->m_size' to write DCC commands via snprintf(3). This may
lead to OOB write access, because 'bptr' points somewhere in
the middle of 'mbuf' buffer, not at the start. Use M_FREEROOM(m)
size to avoid OOB access.
Reported-by: default avatarVishnu Dev TJ <>
Signed-off-by: default avatarPrasad J Pandit <>
Reviewed-by: Samuel Thibault's avatarSamuel Thibault <>
Message-Id: <>
slirp: use correct size while emulating commands
While emulating services in tcp_emu(), it uses 'mbuf' size
'm->m_size' to write commands via snprintf(3). Use M_FREEROOM(m)
size to avoid possible OOB access.
Signed-off-by: default avatarPrasad J Pandit <>
Signed-off-by: Samuel Thibault's avatarSamuel Thibault <>
Message-Id: <>

Roberto Lumbreras <> no
015_949003_explicit_extern_declaration.patch 949003

Bernhard √úbelacker <> no debian 2020-09-02
016_c11b4078042_fix_64_bit_issue_in_slirp.patch Fix 64 bit issue in slirp

no debian 2020-09-02
017_CVE-2020-8608.patch patch for CVE-2020-8608=================================================================== no

All known versions for source package 'slirp'