CVE-2021-3592
Published: 15 June 2021
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Notes
Author | Note |
---|---|
mdeslaur | patches for this introduced a regression that was fixed in 4.6.1 |
Priority
Status
Package | Release | Status |
---|---|---|
libslirp Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Released
(4.1.0-2ubuntu2.2)
|
|
groovy |
Released
(4.3.1-1ubuntu0.1)
|
|
hirsute |
Released
(4.4.0-1ubuntu0.1)
|
|
impish |
Released
(4.4.0-1ubuntu0.21.10.1)
|
|
jammy |
Released
(4.6.1-1)
|
|
kinetic |
Released
(4.6.1-1)
|
|
lunar |
Released
(4.6.1-1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(out of standard support)
|
|
Patches: upstream: https://gitlab.freedesktop.org/slirp/libslirp/-/commit/93e645e72a056ec0b2c16e0299fc5c6b94e4ca17 (v4.6.0) upstream: https://gitlab.freedesktop.org/slirp/libslirp/-/commit/f13cad45b25d92760bb0ad67bec0300a4d7d5275 (v4.6.0) upstream: https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2eca0838eee1da96204545e22cdaed860d9d7c6c (v4.6.0) upstream: https://gitlab.freedesktop.org/slirp/libslirp/-/commit/c9f314f6e315a5518432761fea864196a290f799 (regression fix) |
||
qemu Launchpad, Ubuntu, Debian |
bionic |
Released
(1:2.11+dfsg-1ubuntu7.37)
|
focal |
Not vulnerable
(uses system libslirp)
|
|
groovy |
Not vulnerable
(uses system libslirp)
|
|
hirsute |
Not vulnerable
(uses system libslirp)
|
|
impish |
Not vulnerable
(uses system libslirp)
|
|
jammy |
Not vulnerable
(uses system libslirp)
|
|
kinetic |
Not vulnerable
(uses system libslirp)
|
|
lunar |
Not vulnerable
(uses system libslirp)
|
|
trusty |
Needed
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |