First published: Thu May 14 2020(Updated: )
An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libslirp Project Libslirp | <4.3.1 | |
Redhat Openstack | =13 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
QEMU qemu | ||
redhat/libslirp | <4.3.1 | 4.3.1 |
ubuntu/libslirp | <4.1.0-2ubuntu2.1 | 4.1.0-2ubuntu2.1 |
ubuntu/qemu | <1:2.11+dfsg-1ubuntu7.31 | 1:2.11+dfsg-1ubuntu7.31 |
ubuntu/slirp4netns | <1.0.1-1 | 1.0.1-1 |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 | |
debian/qemu | 1:3.1+dfsg-8+deb10u8 1:3.1+dfsg-8+deb10u12 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u5 1:8.2.1+ds-2 1:8.2.3+ds-2 | |
debian/slirp4netns | <=0.2.3-1 | 1.0.1-2 1.2.0-1 1.2.1-1 |
https://gitlab.freedesktop.org/slirp/libslirp/-/commit/c7ede54cbd2e2b25385325600958ba0124e31cc0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-10756 is a vulnerability that allows local attackers to execute arbitrary code on affected installations of QEMU.
An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.
The affected software versions include Libslirp Project Libslirp 4.3.1, Redhat Openstack 13, Redhat Enterprise Linux 7.0 and 8.0, Canonical Ubuntu Linux 16.04, 18.04, and 20.04, Debian Debian Linux 9.0 and 10.0, and openSUSE Leap 15.0 and 15.1.
The severity of CVE-2020-10756 is medium with a CVSS score of 6.5.
To fix CVE-2020-10756, update to the latest version of the affected software or apply the necessary patches provided by the vendors.