We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
https://security-tracker.debian.org/tracker/CVE-2019-6778
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
QEMU is known to be escapable by exploiting this vulnerability, and probably rootless containers can be compromised as well.
On upstream QEMU, the vulnerability was fixed on Jan 14, 2019 qemu/qemu@a7104ed#diff-5fc9b1ec366ced0ecf3cdfd4b142add5
The fix was to applied to slirp4netns in:
Impact
https://security-tracker.debian.org/tracker/CVE-2019-6778
QEMU is known to be escapable by exploiting this vulnerability, and probably rootless containers can be compromised as well.
Patches
On upstream QEMU, the vulnerability was fixed on Jan 14, 2019 qemu/qemu@a7104ed#diff-5fc9b1ec366ced0ecf3cdfd4b142add5
The fix was to applied to slirp4netns in: