Описание
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in tcp_emu() routine while emulating the Identification protocol and copying message data to a socket buffer. A user or process could use this flaw to crash the QEMU process on the host resulting in a DoS or potentially executing arbitrary code with privileges of the QEMU process.
Отчет
Red Hat OpenStack Platform:
This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack. Updating is recommended, however Red Hat OpenStack installs are not vulnerable to the described flaw due to the vulnerable feature not being used.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Will not fix | ||
Red Hat Enterprise Linux 5 | xen | Not affected | ||
Red Hat Enterprise Linux 8 | virt:rhel/qemu-kvm | Not affected | ||
Red Hat OpenStack Platform 8 (Liberty) | qemu-kvm-rhev | Out of support scope | ||
Red Hat OpenStack Platform 9 (Mitaka) | qemu-kvm-rhev | Out of support scope | ||
Red Hat Enterprise Linux 6 | qemu-kvm | Fixed | RHSA-2019:2892 | 24.09.2019 |
Red Hat Enterprise Linux 7 | qemu-kvm | Fixed | RHSA-2019:1883 | 29.07.2019 |
Red Hat OpenStack Platform 10.0 (Newton) | qemu-kvm-rhev | Fixed | RHSA-2019:2425 | 09.08.2019 |
Red Hat OpenStack Platform 13.0 (Queens) | qemu-kvm-rhev | Fixed | RHSA-2019:2425 | 09.08.2019 |
Red Hat OpenStack Platform 14.0 (Rocky) | qemu-kvm-rhev | Fixed | RHSA-2019:2425 | 09.08.2019 |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer ove ...
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
7.8 High
CVSS3