First published: Sun Aug 25 2019(Updated: )
A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user/process could use this flaw to crash the Qemu process on the host resulting in DoS. Upstream patch: --------------- -> <a href="https://gitlab.freedesktop.org/slirp/libslirp/commit/c59279437eda91841b9d26079c70b8a540d41204">https://gitlab.freedesktop.org/slirp/libslirp/commit/c59279437eda91841b9d26079c70b8a540d41204</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <2:0.12.1.2-2.506.el6_10.6 | 2:0.12.1.2-2.506.el6_10.6 |
redhat/slirp4netns | <0:0.3.0-8.el7_7 | 0:0.3.0-8.el7_7 |
libslirp | =4.0.0 | |
QEMU KVM | =4.1.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 | |
debian/slirp4netns | 1.0.1-2 1.2.0-1 1.2.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-15890 is a vulnerability in libslirp 4.0.0 as used in QEMU 4.1.0 that allows a use-after-free issue in the SLiRP networking implementation.
The severity of CVE-2019-15890 is high, with a severity value of 7.5.
CVE-2019-15890 affects QEMU versions 4.1.0 and libslirp version 4.0.0.
Apply the provided updates or patches from the respective software vendors.
More information about CVE-2019-15890 can be found at the provided references.