Bug 1664205 (CVE-2019-6778)
Summary: | CVE-2019-6778 QEMU: slirp: heap buffer overflow in tcp_emu() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ailan, amit, areis, berrange, cfergeau, dbecker, drjones, dwmw2, imammedo, itamar, jen, jforbes, jjoyce, jschluet, kbasil, kira_cxy, knoel, lhh, lpeer, marcandre.lureau, m.a.young, mburns, mkenneth, mrezanin, mst, pbonzini, rbalakri, rjones, rkrcmar, robinlee.sysu, sclewis, security-response-team, slinaber, virt-maint, virt-maint, vkuznets, xen-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in tcp_emu() routine while emulating the Identification protocol and copying message data to a socket buffer. A user or process could use this flaw to crash the QEMU process on the host resulting in a DoS or potentially executing arbitrary code with privileges of the QEMU process.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-29 19:18:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1669066, 1669067, 1669068, 1669069, 1669070, 1669071, 1669072, 1669369, 1669370, 1669371, 1669373, 1669374, 1669375, 1693076, 1727642, 1732324 | ||
Bug Blocks: | 1664206 |
Description
Sam Fowler
2019-01-08 02:39:09 UTC
Acknowledgments: Name: Kira (Tencent Keen Security Lab) Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1669072] Statement: Red Hat OpenStack Platform: This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack. Updating is recommended, however Red Hat OpenStack installs are not vulnerable to the described flaw due to the vulnerable feature not being used. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1883 https://access.redhat.com/errata/RHSA-2019:1883 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-6778 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Red Hat Virtualization Engine 4.2 Red Hat Virtualization Engine 4.3 Via RHSA-2019:1968 https://access.redhat.com/errata/RHSA-2019:1968 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 14.0 (Rocky) Via RHSA-2019:2425 https://access.redhat.com/errata/RHSA-2019:2425 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:2892 https://access.redhat.com/errata/RHSA-2019:2892 |