Bug 1798453 (CVE-2020-8608)
Summary: | CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Prasad Pandit <ppandit> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ailan, amit, andbartl, areis, berrange, bmontgom, cfergeau, dbecker, drjones, dwmw2, eparis, imammedo, itamar, jburrell, jen, jferlan, jforbes, jjoyce, jmaloy, jnovy, jokerman, jschluet, kbasil, knoel, lhh, lpeer, lsm5, marcandre.lureau, m.a.young, mburns, mkenneth, mrezanin, mst, ngu, nstielau, pbonzini, qzhang, ribarry, rjones, robinlee.sysu, sclewis, slinaber, sponnaga, virt-maint, virt-maint, vkuznets, xen-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libslirp-4.3.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
An out-of-bounds heap buffer access flaw was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in tcp_emu() routine while emulating IRC and other protocols due to unsafe usage of the snprintf(3) function. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-03-17 22:31:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1798454, 1798966, 1798969, 1798970, 1798971, 1798972, 1798973, 1798974, 1798975, 1798976, 1798977, 1798978, 1798979, 1798980, 1798981, 1798982, 1798983, 1798984, 1798993, 1798994, 1800427, 1800441, 1800443, 1800515, 1800516, 1800517, 1800518, 1834475, 1834476, 1834477, 1834478, 1834479, 1834758, 1834759, 1834760, 1845560 | ||
Bug Blocks: | 1798415 |
Description
Prasad Pandit
2020-02-05 11:59:27 UTC
Acknowledgments: Name: Laszlo Ersek (redhat.com) Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1798454] Statement: This issue affects user-mode or SLiRP networking implementation of the QEMU emulator. Though qemu-kvm package is built with SLiRP networking support, due to its limitations, it is not used by the virtual machine guests by default. This issue affects versions of the qemu-kvm package as shipped with Red Hat Enterprise Linux 5, 6, 7, 8 and Red Hat Enterprise Linux Advanced Virtualization 8. Future qemu-kvm package updates for Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise Linux Advanced Virtualization 8 may address this issue. Red Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This issue is currently not planned to be addressed in its future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. Red Hat OpenStack Platform: This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack Platform. Although updating is recommended for affected versions (see below), Red Hat OpenStack Platform environments are not vulnerable. Mitigation: This issue can only be resolved by applying updates. Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extras Via RHSA-2020:0889 https://access.redhat.com/errata/RHSA-2020:0889 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8608 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1208 https://access.redhat.com/errata/RHSA-2020:1208 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1209 https://access.redhat.com/errata/RHSA-2020:1209 This issue has been addressed in the following products: Advanced Virtualization for RHEL 8.1.1 Via RHSA-2020:1261 https://access.redhat.com/errata/RHSA-2020:1261 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Red Hat Virtualization Engine 4.3 Via RHSA-2020:1292 https://access.redhat.com/errata/RHSA-2020:1292 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2020:1300 https://access.redhat.com/errata/RHSA-2020:1300 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:1351 https://access.redhat.com/errata/RHSA-2020:1351 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:1352 https://access.redhat.com/errata/RHSA-2020:1352 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1379 https://access.redhat.com/errata/RHSA-2020:1379 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:1403 https://access.redhat.com/errata/RHSA-2020:1403 This issue has been addressed in the following products: Red Hat Virtualization Engine 4.2 Via RHSA-2020:2342 https://access.redhat.com/errata/RHSA-2020:2342 This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:2730 https://access.redhat.com/errata/RHSA-2020:2730 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2773 https://access.redhat.com/errata/RHSA-2020:2773 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2774 https://access.redhat.com/errata/RHSA-2020:2774 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:2844 https://access.redhat.com/errata/RHSA-2020:2844 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:3040 https://access.redhat.com/errata/RHSA-2020:3040 |