An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2753-1 qemu security update
Debian DLA Debian DLA DLA-2753-2 qemu regression update
Debian DLA Debian DLA DLA-3362-1 qemu security update
EUVD EUVD EUVD-2021-26899 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Ubuntu USN Ubuntu USN USN-5009-1 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5009-2 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5010-1 QEMU vulnerabilities
Ubuntu USN Ubuntu USN USN-7094-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:01:06.527Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-3592

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-15T21:15:09.307

Modified: 2024-11-21T06:21:55.287

Link: CVE-2021-3592

cve-icon Redhat

Severity : Low

Publid Date: 2021-06-14T00:00:00Z

Links: CVE-2021-3592 - Bugzilla

cve-icon OpenCVE Enrichment

No data.