First published: Tue Mar 17 2020(Updated: )
The slirp4netns package contains user-mode networking for unprivileged network namespaces. It is required to enable networking for rootless containers.<br>Security Fix(es):<br><li> QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)</li> <li> QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)</li> <li> CVE-2020-8608 slirp4netns: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages</li> <li> CVE-2019-15890 QEMU: Slirp: use-after-free during packet reassembly</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
redhat/slirp4netns-debuginfo | <0.3.0-8.el7_7 | 0.3.0-8.el7_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:0889 is considered moderate due to potential heap buffer overflow vulnerabilities.
To fix RHSA-2020:0889, update the slirp4netns package to version 0.3.0-8.el7_7 or later.
RHSA-2020:0889 addresses a heap buffer overflow vulnerability identified as CVE-2019-14378 in the slirp component.
RHSA-2020:0889 affects systems using the slirp4netns package prior to version 0.3.0-8.el7_7.
Yes, documentation related to RHSA-2020:0889 can typically be found within Red Hat's advisory resources.