First published: Thu May 14 2020(Updated: )
An out-of-bounds read vulnerability in function icmp6_send_echoreply() in ip6_icmp.c of libslirp could allow a guest user/process to leak contents of the host memory, leading to possible information disclosure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libslirp | <4.3.1 | 4.3.1 |
QEMU KVM | ||
libslirp | <4.3.1 | |
redhat openstack | =13 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.1+ds-1 | |
debian/slirp4netns | 1.0.1-2 1.2.0-1 1.2.1-1 | |
Red Hat OpenStack for IBM Power | =13 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE openSUSE | =15.0 | |
SUSE openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-10756 is a vulnerability that allows local attackers to execute arbitrary code on affected installations of QEMU.
An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.
The affected software versions include Libslirp Project Libslirp 4.3.1, Redhat Openstack 13, Redhat Enterprise Linux 7.0 and 8.0, Canonical Ubuntu Linux 16.04, 18.04, and 20.04, Debian Debian Linux 9.0 and 10.0, and openSUSE Leap 15.0 and 15.1.
The severity of CVE-2020-10756 is medium with a CVSS score of 6.5.
To fix CVE-2020-10756, update to the latest version of the affected software or apply the necessary patches provided by the vendors.