First published: Thu Jun 10 2021(Updated: )
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libslirp | <4.6.0 | 4.6.0 |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 1:9.2.1+ds-1 | |
libslirp | <4.6.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =33 | |
Fedora | =34 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3593.
The severity of CVE-2021-3593 is low.
The affected software includes libslirp version up to exclusive 4.6.0, Redhat Enterprise Linux 8.0, Fedora 33 and 34, Debian Debian Linux 9.0, and various versions of Ubuntu and QEMU.
CVE-2021-3593 is an invalid pointer initialization issue found in the SLiRP networking implementation of QEMU, which could lead to out-of-bounds read access.
To fix CVE-2021-3593, update libslirp to version 4.6.1 or apply the necessary patches provided by the vendor.