First published: Thu May 14 2020(Updated: )
An out-of-bounds read vulnerability in function icmp6_send_echoreply() in ip6_icmp.c of libslirp could allow a guest user/process to leak contents of the host memory, leading to possible information disclosure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libslirp Project Libslirp | <4.3.1 | |
Redhat Openstack | =13 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
QEMU qemu | ||
redhat/libslirp | <4.3.1 | 4.3.1 |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 | |
debian/slirp4netns | 1.0.1-2 1.2.0-1 1.2.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-10756 is a vulnerability that allows local attackers to execute arbitrary code on affected installations of QEMU.
An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.
The affected software versions include Libslirp Project Libslirp 4.3.1, Redhat Openstack 13, Redhat Enterprise Linux 7.0 and 8.0, Canonical Ubuntu Linux 16.04, 18.04, and 20.04, Debian Debian Linux 9.0 and 10.0, and openSUSE Leap 15.0 and 15.1.
The severity of CVE-2020-10756 is medium with a CVSS score of 6.5.
To fix CVE-2020-10756, update to the latest version of the affected software or apply the necessary patches provided by the vendors.