{
  "threat_severity" : "Important",
  "public_date" : "2019-07-28T00:00:00Z",
  "bugzilla" : {
    "description" : "QEMU: slirp: heap buffer overflow during packet reassembly",
    "id" : "1734745",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1734745"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.", "A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the ip_reass() routine while reassembling incoming packets if the first fragment is bigger than the m->m_dat[] buffer. An attacker could use this flaw to crash the QEMU process on the host, resulting in a Denial of Service or potentially executing arbitrary code with privileges of the QEMU process." ],
  "statement" : "Red Hat OpenStack Platform:                                                                                                                 \n* This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack Platform. Although updating is recommended for affected versions (see below), Red Hat OpenStack Platform environments are not vulnerable.\n* Because the flaw's impact is Low, it will not be fixed in Red Hat OpenStack Platform 9 which is retiring within a few weeks of the flaw's public date.",
  "acknowledgement" : "Red Hat would like to thank Vishnu Dev for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Advanced Virtualization for RHEL 8.1.0",
    "release_date" : "2019-11-06T00:00:00Z",
    "advisory" : "RHBA-2019:3723",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.1::el8",
    "package" : "virt:8.1-8010020190927171011.cdc1202b"
  }, {
    "product_name" : "Advanced Virtualization for RHEL 8.1.0",
    "release_date" : "2019-11-06T00:00:00Z",
    "advisory" : "RHBA-2019:3723",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.1::el8",
    "package" : "virt-devel:8.1-8010020190927171011.cdc1202b"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2020-03-10T00:00:00Z",
    "advisory" : "RHSA-2020:0775",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.506.el6_10.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-11-26T00:00:00Z",
    "advisory" : "RHSA-2019:3968",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-ma-10:2.12.0-33.el7_7.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2020-02-04T00:00:00Z",
    "advisory" : "RHSA-2020:0366",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-167.el7_7.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.6 Extended Update Support",
    "release_date" : "2020-05-11T00:00:00Z",
    "advisory" : "RHSA-2020:2065",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.6",
    "package" : "qemu-kvm-ma-10:2.12.0-18.el7_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.6 Extended Update Support",
    "release_date" : "2020-05-13T00:00:00Z",
    "advisory" : "RHSA-2020:2126",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.6",
    "package" : "qemu-kvm-10:1.5.3-160.el7_6.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extras",
    "release_date" : "2020-03-17T00:00:00Z",
    "advisory" : "RHSA-2020:0889",
    "cpe" : "cpe:/a:redhat:rhel_extras_other:7",
    "package" : "slirp4netns-0:0.3.0-8.el7_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-09-12T00:00:00Z",
    "advisory" : "RHBA-2019:2715",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt-devel:rhel-8000020190828150510.f8e95b4e"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-09-12T00:00:00Z",
    "advisory" : "RHBA-2019:2715",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt:rhel-8000020190828150510.f8e95b4e"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-11-05T00:00:00Z",
    "advisory" : "RHSA-2019:3403",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:rhel8-8010020190927090915.4985cc55"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-11-05T00:00:00Z",
    "advisory" : "RHSA-2019:3494",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:1.0-8010020190927091243.4985cc55"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10.0 (Newton)",
    "release_date" : "2019-12-19T00:00:00Z",
    "advisory" : "RHSA-2019:4344",
    "cpe" : "cpe:/a:redhat:openstack:10::el7",
    "package" : "qemu-kvm-rhev-10:2.12.0-33.el7_7.4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13.0 (Queens)",
    "release_date" : "2019-11-07T00:00:00Z",
    "advisory" : "RHSA-2019:3787",
    "cpe" : "cpe:/a:redhat:openstack:13::el7",
    "package" : "qemu-kvm-rhev-10:2.12.0-33.el7_7.4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat OpenStack Platform 14.0 (Rocky)",
    "release_date" : "2019-11-06T00:00:00Z",
    "advisory" : "RHSA-2019:3742",
    "cpe" : "cpe:/a:redhat:openstack:14::el7",
    "package" : "qemu-kvm-rhev-10:2.12.0-33.el7_7.4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2019-10-23T00:00:00Z",
    "advisory" : "RHSA-2019:3179",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.12.0-33.el7_7.4"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2020-03-31T00:00:00Z",
    "advisory" : "RHSA-2020:1216",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.12.0-44.el7"
  }, {
    "product_name" : "Red Hat Virtualization Engine 4.2",
    "release_date" : "2020-06-01T00:00:00Z",
    "advisory" : "RHSA-2020:2342",
    "cpe" : "cpe:/a:redhat:rhev_manager:4.2",
    "package" : "qemu-kvm-rhev-10:2.12.0-18.el7_6.11"
  }, {
    "product_name" : "Red Hat Virtualization Engine 4.3",
    "release_date" : "2019-10-23T00:00:00Z",
    "advisory" : "RHSA-2019:3179",
    "cpe" : "cpe:/a:redhat:rhev_manager:4.3",
    "package" : "qemu-kvm-rhev-10:2.12.0-33.el7_7.4"
  }, {
    "product_name" : "Red Hat Virtualization Engine 4.3",
    "release_date" : "2020-03-31T00:00:00Z",
    "advisory" : "RHSA-2020:1216",
    "cpe" : "cpe:/a:redhat:rhev_manager:4.3",
    "package" : "qemu-kvm-rhev-10:2.12.0-44.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Out of support scope",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8 Advanced Virtualization",
    "fix_state" : "Affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8::el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "slirp4netns",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenStack Platform 9 (Mitaka)",
    "fix_state" : "Will not fix",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/a:redhat:openstack:9",
    "impact" : "low"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-14378\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-14378" ],
  "name" : "CVE-2019-14378",
  "mitigation" : {
    "value" : "There is no external mitigation to prevent this out-of-bounds heap memory access.",
    "lang" : "en:us"
  },
  "csaw" : false
}