qemu is vulnerable to arbitrary code execution. A buffer overflow in tcp_subr.c
due to a misuse in the snprintf
return values allow an attacker to execute arbitrary code.
lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
access.redhat.com/errata/RHBA-2020:0527
gitlab.freedesktop.org/slirp/libslirp/-/tags/v4.1.0
gitlab.freedesktop.org/slirp/libslirp/commit/68ccb8021a838066f0951d4b2817eb6b6f10a843
lists.debian.org/debian-lts-announce/2020/03/msg00015.html
lists.debian.org/debian-lts-announce/2020/03/msg00017.html
lists.debian.org/debian-lts-announce/2020/07/msg00020.html
lists.debian.org/debian-lts-announce/2021/02/msg00012.html
security.gentoo.org/glsa/202003-66
security.netapp.com/advisory/ntap-20201001-0002/
usn.ubuntu.com/4283-1/
www.debian.org/security/2020/dsa-4733
www.openwall.com/lists/oss-security/2020/02/06/2