First published: Thu Jun 10 2021(Updated: )
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libslirp Project Libslirp | <4.6.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/libslirp | <4.6.0 | 4.6.0 |
debian/libslirp | 4.4.0-1+deb11u2 4.7.0-1 4.8.0-1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.1+ds-2 1:9.1.1+ds-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-3595.
CVE-2021-3595 has a severity level of 3.8 (low).
The affected software includes libslirp versions up to and including 4.6.0, Red Hat Enterprise Linux 8.0, Debian Debian Linux 9.0, Fedora 33 and 34.
To fix CVE-2021-3595, it is recommended to update to libslirp version 4.6.1 or newer.
More information about CVE-2021-3595 can be found at the following references: [link1](https://gitlab.freedesktop.org/slirp/libslirp/-/commit/93e645e7), [link2](https://gitlab.freedesktop.org/slirp/libslirp/-/commit/3f179481), [link3](https://gitlab.freedesktop.org/slirp/libslirp/-/commit/990163cf).