First published: Thu Jun 10 2021(Updated: )
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libslirp | <4.6.0 | 4.6.0 |
libslirp | <4.6.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 | |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.2+ds-1 1:10.0.0~rc1+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3592 is an invalid pointer initialization issue found in the SLiRP networking implementation of QEMU.
CVE-2021-3592 occurs in the bootp_input() function while processing a udp packet that is smaller than the size of the 'bootp_t' structure.
CVE-2021-3592 has a severity value of 3.8 (low).
The affected software includes libslirp, Redhat Enterprise Linux, Debian Linux, and Fedora.
You can fix CVE-2021-3592 by applying the recommended updates or patches provided by the software vendors.