ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.Referenceshttps://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210http://www.openwall.com/lists/oss-security/2019/08/01/2https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/https://seclists.org/bugtraq/2019/Aug/41https://www.debian.org/security/2019/dsa-4506https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/https://news.ycombinator.com/item?id=20799010http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.htmlhttps://www.debian.org/security/2019/dsa-4512https://seclists.org/bugtraq/2019/Sep/3http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.htmlhttps://support.f5.com/csp/article/K25423748https://lists.debian.org/debian-lts-announce/2019/09/msg00021.htmlhttps://support.f5.com/csp/article/K25423748?utm_source=f5support&%3Butm_medium=RSShttps://access.redhat.com/errata/RHSA-2019:3179https://access.redhat.com/errata/RHSA-2019:3403https://access.redhat.com/errata/RHSA-2019:3494https://access.redhat.com/errata/RHSA-2019:3742https://access.redhat.com/errata/RHSA-2019:3787https://usn.ubuntu.com/4191-2/http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.htmlhttps://usn.ubuntu.com/4191-1/https://access.redhat.com/errata/RHSA-2019:3968https://access.redhat.com/errata/RHSA-2019:4344https://access.redhat.com/errata/RHSA-2020:0366https://access.redhat.com/errata/RHSA-2020:0775