First published: Tue Mar 17 2020(Updated: )
The slirp4netns package contains user-mode networking for unprivileged network namespaces. It is required to enable networking for rootless containers.<br>Security Fix(es):<br><li> QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)</li> <li> QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)</li> <li> CVE-2020-8608 slirp4netns: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages</li> <li> CVE-2019-15890 QEMU: Slirp: use-after-free during packet reassembly</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.