slirp: update to fix CVE-2020-29129 CVE-2020-29130
commit37c0c885d19a4c2d69faed891b5c02aaffbdccfb
authorMarc-André Lureau <marcandre.lureau@redhat.com>
Fri, 27 Nov 2020 16:57:07 +0000 (27 20:57 +0400)
committerMarc-André Lureau <marcandre.lureau@redhat.com>
Fri, 27 Nov 2020 16:57:11 +0000 (27 20:57 +0400)
treedbc063a4ec7f1f4636dd807629de6d5157569b57
parentea8208249d1082eae0444934efb3b59cd3183f05
slirp: update to fix CVE-2020-29129 CVE-2020-29130

An out-of-bounds access issue was found in the SLIRP user networking
implementation of QEMU. It could occur while processing ARP/NCSI
packets, if the packet length was shorter than required to accommodate
respective protocol headers and payload. A privileged guest user may use
this flaw to potentially leak host information bytes.

Marc-André Lureau (1):
      Merge branch 'stable-4.2' into 'stable-4.2'

Prasad J Pandit (1):
      slirp: check pkt_len before reading protocol header

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
slirp