First published: Fri Nov 27 2020(Updated: )
An out-of-bounds access issue was found in the SLiRP user networking implementation of QEMU. It could occur while processing ARP/NCSI packets, if the packet length was shorter than required to accommodate respective protocol headers and payload. A privileged guest user may use this flaw to potentially leak host information bytes. Upstream patch: --------------- -> <a href="https://lists.freedesktop.org/archives/slirp/2020-November/000115.html">https://lists.freedesktop.org/archives/slirp/2020-November/000115.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1902231 is classified as high due to potential exploitation by a privileged guest user.
To fix REDHAT-BUG-1902231, you should apply the latest security patches provided by the QEMU project.
REDHAT-BUG-1902231 affects systems running QEMU with the SLiRP user networking implementation.
The flaw in REDHAT-BUG-1902231 is an out-of-bounds access issue occurring in the processing of ARP/NCSI packets.
No, an attacker must have privileged guest access to exploit REDHAT-BUG-1902231.