qemu is vulnerable to arbitrary code execution. A heap-based buffer overflow in the function tcp_emu
in slirp/tcp_subr.c
allows an attacker to execute arbitrary code on the system.
lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html
lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
www.openwall.com/lists/oss-security/2019/01/24/5
www.securityfocus.com/bid/106758
access.redhat.com/errata/RHSA-2019:1883
access.redhat.com/errata/RHSA-2019:1968
access.redhat.com/errata/RHSA-2019:2425
access.redhat.com/errata/RHSA-2019:2892
access.redhat.com/security/updates/classification/#important
lists.fedoraproject.org/archives/list/[email protected]/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
lists.fedoraproject.org/archives/list/[email protected]/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/
lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html
seclists.org/bugtraq/2019/May/76
usn.ubuntu.com/3923-1/
www.debian.org/security/2019/dsa-4454