USN-5009-1: libslirp vulnerabilities

15 July 2021

Several security issues were fixed in libslirp.

Releases

Packages

  • libslirp - General purpose TCP-IP emulator library

Details

Qiuhao Li discovered that libslirp incorrectly handled certain header data
lengths. An attacker inside a guest could possibly use this issue to leak
sensitive information from the host. This issue only affected Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-29129, CVE-2020-29130)

It was discovered that libslirp incorrectly handled certain udp packets. An
attacker inside a guest could possibly use this issue to leak sensitive
information from the host. (CVE-2021-3592, CVE-2021-3593, CVE-2021-3594,
CVE-2021-3595)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-5009-2: libslirp-dev, libslirp0, libslirp
  • USN-5010-1: qemu-block-extra, qemu-system-sparc, qemu-kvm, qemu-system-gui, qemu-guest-agent, qemu-system-ppc, qemu-system-misc, qemu-system-x86-xen, qemu-system-common, qemu-system-s390x, qemu-system-x86-microvm, qemu-system, qemu-utils, qemu-user-binfmt, qemu-system-data, qemu, qemu-system-mips, qemu-system-x86, qemu-system-arm, qemu-user-static, qemu-user