First published: Thu Jul 15 2021(Updated: )
Qiuhao Li discovered that libslirp incorrectly handled certain header data lengths. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10. (CVE-2020-29129, CVE-2020-29130) It was discovered that libslirp incorrectly handled certain udp packets. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. (CVE-2021-3592, CVE-2021-3593, CVE-2021-3594, CVE-2021-3595)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libslirp0 | <4.4.0-1ubuntu0.1 | 4.4.0-1ubuntu0.1 |
Ubuntu Ubuntu | =21.04 | |
All of | ||
ubuntu/libslirp0 | <4.3.1-1ubuntu0.1 | 4.3.1-1ubuntu0.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/libslirp0 | <4.1.0-2ubuntu2.2 | 4.1.0-2ubuntu2.2 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability IDs for libslirp vulnerabilities are CVE-2020-29129 and CVE-2020-29130.
libslirp incorrectly handles certain header data lengths.
An attacker inside a guest could use these vulnerabilities to leak sensitive information from the host.
Ubuntu 20.04 LTS and Ubuntu 20.10 are affected by these vulnerabilities.
Upgrade to libslirp version 4.4.0-1ubuntu0.1 for Ubuntu 20.04 LTS, upgrade to libslirp version 4.3.1-1ubuntu0.1 for Ubuntu 20.10, or upgrade to libslirp version 4.1.0-2ubuntu2.2 for Ubuntu 21.04.