CVE-2019-14378

NameCVE-2019-14378
Descriptionip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1927-1, DSA-4506-1, DSA-4512-1
NVD severitymedium
Debian Bugs933741, 933742

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)stretch1:2.8+dfsg-6+deb9u9fixed
stretch (security)1:2.8+dfsg-6+deb9u10fixed
buster, buster (security)1:3.1+dfsg-8+deb10u7fixed
bullseye1:5.0-13fixed
sid1:5.0-14fixed
slirp4netns (PTS)buster0.2.3-1fixed
bullseye, sid1.0.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcejessie1:2.1+dfsg-12+deb8u12DLA-1927-1
qemusourcestretch1:2.8+dfsg-6+deb9u8DSA-4506-1
qemusourcebuster1:3.1+dfsg-8+deb10u2DSA-4512-1
qemusource(unstable)1:4.1-1933741
qemu-kvmsource(unstable)(unfixed)
slirp4netnssourcebuster0.2.3-1
slirp4netnssource(unstable)0.3.2-1933742

Notes

https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210

Search for package or bug name: Reporting problems