vulnerability
Red Hat OpenShift: CVE-2020-7039: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | 2020-01-16 | 2020-12-29 | 2025-04-11 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
2020-01-16
Added
2020-12-29
Modified
2025-04-11
Description
tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
Solution
linuxrpm-upgrade-slirp4netns
References
- CVE-2020-7039
- https://attackerkb.com/topics/CVE-2020-7039
- REDHAT-RHSA-2020:0348
- REDHAT-RHSA-2020:0775
- REDHAT-RHSA-2020:0889
- REDHAT-RHSA-2020:1116
- REDHAT-RHSA-2020:1150
- REDHAT-RHSA-2020:1261
- REDHAT-RHSA-2020:1296
- REDHAT-RHSA-2020:1300
- REDHAT-RHSA-2020:1344
- REDHAT-RHSA-2020:1351
- REDHAT-RHSA-2020:1352
- REDHAT-RHSA-2020:1358
- REDHAT-RHSA-2020:1360
- REDHAT-RHSA-2020:2342
- REDHAT-RHSA-2020:2730

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.