Source: qemu Version: 1:3.1+dfsg-8 Severity: grave Tags: security upstream Control: clone -1 -2 Control: reassign -2 src:slirp4netns 0.3.1-1 Control: retitle -2 slirp4netns: CVE-2019-14459: heap buffer overflow during packet reassembly
Hi, The following vulnerability was published for qemu (respective the SLiRP networking implemenatation which is as well forked in slirp4netns). CVE-2019-14378[0]: | ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer | overflow via a large packet because it mishandles a case involving the | first fragment. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-14378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378 [1] https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210 [2] https://www.openwall.com/lists/oss-security/2019/08/01/2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore