CVE-2020-7039
Summary
| CVE | CVE-2020-7039 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-16 23:15:00 UTC |
| Updated | 2021-02-14 03:50:00 UTC |
| Description | tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| slirp: use correct size while emulating IRC commands (ce131029) · Commits · slirp / libslirp · GitLab |
MISC |
gitlab.freedesktop.org |
Patch, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| QEMU: Multiple vulnerabilities (GLSA 202005-02) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| Bugtraq: [SECURITY] [DSA 4616-1] qemu security update |
BUGTRAQ |
seclists.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 2076-1] slirp security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-4283-1: QEMU vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| [SECURITY] [DLA 2551-1] slirp security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| tcp_emu: Fix oob access (2655fffe) · Commits · slirp / libslirp · GitLab |
MISC |
gitlab.freedesktop.org |
Patch, Third Party Advisory |
| oss-security - CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp
protocols in tcp_emu() |
CONFIRM |
www.openwall.com |
Mailing List, Patch, Third Party Advisory |
| Debian -- Security Information -- DSA-4616-1 qemu |
DEBIAN |
www.debian.org |
Third Party Advisory |
| [SECURITY] [DLA 2090-1] qemu security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| slirp: use correct size while emulating commands (82ebe9c3) · Commits · slirp / libslirp · GitLab |
MISC |
gitlab.freedesktop.org |
Patch, Third Party Advisory |
| [security-announce] openSUSE-SU-2020:0468-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 377167 Alibaba Cloud Linux Security Update for qemu-kvm (ALINUX2-SA-2020:0072)
- 377335 Alibaba Cloud Linux Security Update for container-tools:rhel8 (ALINUX3-SA-2022:0110)
- 377413 Alibaba Cloud Linux Security Update for virt:rhel and virt-devel:rhel (ALINUX3-SA-2022:0119)
- 900050 CBL-Mariner Linux Security Update for qemu-kvm 4.2.0
- 903446 Common Base Linux Mariner (CBL-Mariner) Security Update for qemu-kvm (3579)
- 906000 Common Base Linux Mariner (CBL-Mariner) Security Update for qemu-kvm (3579-1)
- 940144 AlmaLinux Security Update for virt:rhel (ALSA-2020:1358)
- 940554 AlmaLinux Security Update for container-tools:1.0 (ALSA-2020:1360)
- 940555 AlmaLinux Security Update for container-tools:rhel8 (ALSA-2020:0348)
- 960718 Rocky Linux Security Update for virt:rhel (RLSA-2020:1358)
- 960729 Rocky Linux Security Update for container-tools:rhel8 (RLSA-2020:0348)
- 960813 Rocky Linux Security Update for container-tools:1.0 (RLSA-2020:1360)