Bug 1143797 - VUL-0: CVE-2019-14378: xen: heap buffer overflow during packet reassembly in slirp networking implementation
Summary: VUL-0: CVE-2019-14378: xen: heap buffer overflow during packet reassembly in...
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/238209/
Whiteboard: CVSSv3:RedHat:CVE-2019-14378:7.0:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2019-08-01 10:14 UTC by Alexandros Toptsoglou
Modified: 2022-06-10 09:10 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2019-08-01 10:14:06 UTC
+++ This bug was initially created as a clone of Bug #1143794 +++

CVE-2019-14378

A heap buffer overflow issue was found in the SLiRP networking implementation
of the QEMU emulator. It occurs in ip_reass() routine while reassembling
incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. 

A user/process could use this flaw to crash the Qemu process on the host
resulting in DoS or potentially execute arbitrary code with privileges of the 
QEMU process.

Upstream patch:
---------------
  -> https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210

Reference:
----------
  -> https://www.openwall.com/lists/oss-security/2019/08/01/2

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1734745
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14378
http://seclists.org/oss-sec/2019/q3/107
http://www.cvedetails.com/cve/CVE-2019-14378/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378
https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210
Comment 1 Alexandros Toptsoglou 2019-08-01 10:16:39 UTC
All codestreams (including LTSS) from SLE11-SP1-TD till and including SLE12-SP4 seem affected
Comment 3 Swamp Workflow Management 2019-10-23 16:14:01 UTC
SUSE-SU-2019:2753-1: An update that solves 16 vulnerabilities and has four fixes is now available.

Category: security (important)
Bug References: 1027519,1111331,1126140,1126141,1126192,1126195,1126196,1126197,1126198,1126201,1127400,1129642,1131811,1137717,1138294,1143797,1145240,1145774,1146874,1149813
CVE References: CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2019-11091,CVE-2019-12068,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344,CVE-2019-17345,CVE-2019-17346,CVE-2019-17347,CVE-2019-17348
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    xen-4.11.2_02-2.14.2
SUSE Linux Enterprise Server 12-SP4 (src):    xen-4.11.2_02-2.14.2
SUSE Linux Enterprise Desktop 12-SP4 (src):    xen-4.11.2_02-2.14.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Swamp Workflow Management 2019-10-24 16:17:18 UTC
SUSE-SU-2019:2769-1: An update that fixes 16 vulnerabilities is now available.

Category: security (important)
Bug References: 1126140,1126141,1126192,1126195,1126196,1126197,1126198,1126201,1127400,1133818,1143797,1146874,1149813
CVE References: CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2019-11091,CVE-2019-12068,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344,CVE-2019-17345,CVE-2019-17346,CVE-2019-17347,CVE-2019-17348
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    xen-4.9.4_04-3.56.2
SUSE OpenStack Cloud 8 (src):    xen-4.9.4_04-3.56.2
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    xen-4.9.4_04-3.56.2
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    xen-4.9.4_04-3.56.2
SUSE Linux Enterprise Server 12-SP3-BCL (src):    xen-4.9.4_04-3.56.2
SUSE Enterprise Storage 5 (src):    xen-4.9.4_04-3.56.2
SUSE CaaS Platform 3.0 (src):    xen-4.9.4_04-3.56.2
HPE Helion Openstack 8 (src):    xen-4.9.4_04-3.56.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2019-10-24 16:22:55 UTC
SUSE-SU-2019:14199-1: An update that fixes 13 vulnerabilities is now available.

Category: security (important)
Bug References: 1126140,1126141,1126192,1126195,1126196,1126198,1126201,1127400,1135905,1143797,1145652,1146874,1149813
CVE References: CVE-2019-12067,CVE-2019-12068,CVE-2019-12155,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344,CVE-2019-17346,CVE-2019-17347,CVE-2019-17348
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    xen-4.4.4_40-61.49.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    xen-4.4.4_40-61.49.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2019-10-25 16:18:44 UTC
SUSE-SU-2019:14201-1: An update that fixes 12 vulnerabilities is now available.

Category: security (important)
Bug References: 1047675,1126140,1126141,1126192,1126195,1126196,1130680,1135905,1143797,1145652,1146874,1149813
CVE References: CVE-2017-10806,CVE-2018-20815,CVE-2019-12067,CVE-2019-12068,CVE-2019-12155,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344
Sources used:
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    xen-4.2.5_21-45.33.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    xen-4.2.5_21-45.33.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2019-10-25 16:20:53 UTC
SUSE-SU-2019:2783-1: An update that fixes 11 vulnerabilities is now available.

Category: security (important)
Bug References: 1126140,1126141,1126192,1126195,1126196,1126198,1126201,1127400,1143797,1146874,1149813
CVE References: CVE-2019-12068,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344,CVE-2019-17346,CVE-2019-17347,CVE-2019-17348
Sources used:
SUSE OpenStack Cloud 7 (src):    xen-4.7.6_06-43.54.2
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    xen-4.7.6_06-43.54.2
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    xen-4.7.6_06-43.54.2
SUSE Linux Enterprise Server 12-SP2-BCL (src):    xen-4.7.6_06-43.54.2
SUSE Enterprise Storage 4 (src):    xen-4.7.6_06-43.54.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2020-02-17 17:12:19 UTC
SUSE-SU-2020:0388-1: An update that fixes 25 vulnerabilities is now available.

Category: security (important)
Bug References: 1115045,1126140,1126141,1126192,1126195,1126196,1126201,1135905,1143797,1145652,1146874,1149813,1152497,1154448,1154456,1154458,1154461,1155945,1157888,1158003,1158004,1158005,1158006,1158007,1161181
CVE References: CVE-2018-12207,CVE-2018-19965,CVE-2019-11135,CVE-2019-12067,CVE-2019-12068,CVE-2019-12155,CVE-2019-14378,CVE-2019-15890,CVE-2019-17340,CVE-2019-17341,CVE-2019-17342,CVE-2019-17343,CVE-2019-17344,CVE-2019-17347,CVE-2019-18420,CVE-2019-18421,CVE-2019-18424,CVE-2019-18425,CVE-2019-19577,CVE-2019-19578,CVE-2019-19579,CVE-2019-19580,CVE-2019-19581,CVE-2019-19583,CVE-2020-7211
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    xen-4.5.5_28-22.64.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    xen-4.5.5_28-22.64.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Charles Arnold 2021-01-22 18:48:07 UTC
Backported and released to 11-SP1.
Comment 14 Carlos López 2022-06-10 09:10:20 UTC
Done, closing.