First published: Sun Jul 28 2019(Updated: )
A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user/process could use this flaw to crash the Qemu process on the host resulting in DoS or potentially execute arbitrary code with privileges of the QEMU process. Upstream patch: --------------- -> <a href="https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210">https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/08/01/2">https://www.openwall.com/lists/oss-security/2019/08/01/2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <2:0.12.1.2-2.506.el6_10.6 | 2:0.12.1.2-2.506.el6_10.6 |
redhat/qemu-kvm-ma | <10:2.12.0-33.el7_7.1 | 10:2.12.0-33.el7_7.1 |
redhat/qemu-kvm | <10:1.5.3-167.el7_7.4 | 10:1.5.3-167.el7_7.4 |
redhat/qemu-kvm-ma | <10:2.12.0-18.el7_6.6 | 10:2.12.0-18.el7_6.6 |
redhat/qemu-kvm | <10:1.5.3-160.el7_6.6 | 10:1.5.3-160.el7_6.6 |
redhat/slirp4netns | <0:0.3.0-8.el7_7 | 0:0.3.0-8.el7_7 |
redhat/qemu-kvm-rhev | <10:2.12.0-33.el7_7.4 | 10:2.12.0-33.el7_7.4 |
redhat/qemu-kvm-rhev | <10:2.12.0-44.el7 | 10:2.12.0-44.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-18.el7_6.11 | 10:2.12.0-18.el7_6.11 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 | |
debian/slirp4netns | 1.0.1-2 1.2.0-1 1.2.1-1 | |
libslirp | =4.0.0 |
There is no external mitigation to prevent this out-of-bounds heap memory access.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14378 is a heap buffer overflow vulnerability in the SLiRP networking implementation of the QEMU emulator.
CVE-2019-14378 has a severity score of 8.8, which is considered high.
The software affected by CVE-2019-14378 includes qemu-kvm, qemu-kvm-ma, qemu-kvm-rhev, slirp4netns, and qemu.
To fix CVE-2019-14378, update the affected software to the corresponding patched version provided by the vendor.
You can find more information about CVE-2019-14378 on the Debian security tracker and MITRE's CVE database.