USN-5009-1: libslirp vulnerabilities
15 July 2021
Several security issues were fixed in libslirp.
- libslirp - General purpose TCP-IP emulator library
Qiuhao Li discovered that libslirp incorrectly handled certain header data
lengths. An attacker inside a guest could possibly use this issue to leak
sensitive information from the host. This issue only affected Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-29129, CVE-2020-29130)
It was discovered that libslirp incorrectly handled certain udp packets. An
attacker inside a guest could possibly use this issue to leak sensitive
information from the host. (CVE-2021-3592, CVE-2021-3593, CVE-2021-3594,
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to reboot your computer to make
all the necessary changes.
- USN-5009-2: libslirp-dev, libslirp0, libslirp
- USN-5010-1: qemu-block-extra, qemu-system-sparc, qemu-kvm, qemu-system-gui, qemu-guest-agent, qemu-system-ppc, qemu-system-misc, qemu-system-x86-xen, qemu-system-common, qemu-system-s390x, qemu-system-x86-microvm, qemu-system, qemu-utils, qemu-user-binfmt, qemu-system-data, qemu, qemu-system-mips, qemu-system-x86, qemu-system-arm, qemu-user-static, qemu-user