First published: Thu Nov 26 2020(Updated: )
An out-of-bounds access issue was found in the SLiRP user networking implementation of QEMU. It could occur while processing ARP/NCSI packets, if the packet length was shorter than required to accommodate respective protocol headers and payload. A privileged guest user may use this flaw to potentially leak host information bytes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libslirp Project Libslirp | <=4.3.1 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29130 is an out-of-bounds access issue in the SLiRP user networking implementation of QEMU.
The affected software includes libslirp versions up to and including 4.3.1, Debian Linux 9.0, Fedora 32 and 33.
A privileged guest user can exploit CVE-2020-29130 by triggering an out-of-bounds access issue during the processing of ARP/NCSI packets.
CVE-2020-29130 has a severity rating of 4.3, which is considered medium.
To fix CVE-2020-29130, it is recommended to update to a patched version of libslirp or upgrade the affected software packages.