First published: Thu Jun 10 2021(Updated: )
An invalid pointer initialization issue was found in the SLiRP network ...
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libslirp | <4.6.0 | 4.6.0 |
libslirp | <4.6.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 | |
Debian Linux | =9.0 | |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:10.0.0~rc2+ds-2 1:10.0.0~rc3+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3593.
The severity of CVE-2021-3593 is low.
The affected software includes libslirp version up to exclusive 4.6.0, Redhat Enterprise Linux 8.0, Fedora 33 and 34, Debian Debian Linux 9.0, and various versions of Ubuntu and QEMU.
CVE-2021-3593 is an invalid pointer initialization issue found in the SLiRP networking implementation of QEMU, which could lead to out-of-bounds read access.
To fix CVE-2021-3593, update libslirp to version 4.6.1 or apply the necessary patches provided by the vendor.