vulnerability

Red Hat: CVE-2019-14378: CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
2019-07-29
Added
2019-11-06
Modified
2024-11-27

Description

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

Solution(s)

redhat-upgrade-buildahredhat-upgrade-buildah-debuginforedhat-upgrade-buildah-debugsourceredhat-upgrade-buildah-testsredhat-upgrade-buildah-tests-debuginforedhat-upgrade-cockpit-podmanredhat-upgrade-container-selinuxredhat-upgrade-containernetworking-pluginsredhat-upgrade-containernetworking-plugins-debuginforedhat-upgrade-containernetworking-plugins-debugsourceredhat-upgrade-containers-commonredhat-upgrade-fuse-overlayfsredhat-upgrade-fuse-overlayfs-debuginforedhat-upgrade-fuse-overlayfs-debugsourceredhat-upgrade-oci-systemd-hookredhat-upgrade-oci-systemd-hook-debuginforedhat-upgrade-oci-systemd-hook-debugsourceredhat-upgrade-oci-umountredhat-upgrade-oci-umount-debuginforedhat-upgrade-oci-umount-debugsourceredhat-upgrade-podmanredhat-upgrade-podman-debuginforedhat-upgrade-podman-debugsourceredhat-upgrade-podman-dockerredhat-upgrade-podman-manpagesredhat-upgrade-podman-remoteredhat-upgrade-podman-remote-debuginforedhat-upgrade-podman-testsredhat-upgrade-python-podman-apiredhat-upgrade-qemu-imgredhat-upgrade-qemu-img-maredhat-upgrade-qemu-kvmredhat-upgrade-qemu-kvm-commonredhat-upgrade-qemu-kvm-common-maredhat-upgrade-qemu-kvm-debuginforedhat-upgrade-qemu-kvm-maredhat-upgrade-qemu-kvm-ma-debuginforedhat-upgrade-qemu-kvm-toolsredhat-upgrade-qemu-kvm-tools-maredhat-upgrade-runcredhat-upgrade-runc-debuginforedhat-upgrade-runc-debugsourceredhat-upgrade-skopeoredhat-upgrade-skopeo-debuginforedhat-upgrade-skopeo-debugsourceredhat-upgrade-skopeo-testsredhat-upgrade-slirp4netnsredhat-upgrade-slirp4netns-debuginforedhat-upgrade-slirp4netns-debugsourceredhat-upgrade-toolbox
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.