First published: Tue Jan 08 2019(Updated: )
A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in tcp_emu() routine while emulating Identification protocol and copying message data to a socket buffer. A user/process could use this flaw to crash the Qemu process on the host resulting in DoS or potentially execute arbitrary code with privileges of the QEMU process. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html">https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/01/24/5">https://www.openwall.com/lists/oss-security/2019/01/24/5</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <2:0.12.1.2-2.506.el6_10.5 | 2:0.12.1.2-2.506.el6_10.5 |
redhat/qemu-kvm | <10:1.5.3-160.el7_6.3 | 10:1.5.3-160.el7_6.3 |
redhat/qemu-kvm-rhev | <10:2.12.0-33.el7 | 10:2.12.0-33.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-18.el7_6.7 | 10:2.12.0-18.el7_6.7 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.2+ds-1 | |
debian/slirp4netns | 1.0.1-2 1.2.0-1 1.2.1-1 | |
QEMU KVM | =3.0.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)