An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2753-1 | qemu security update |
Debian DLA |
DLA-2753-2 | qemu regression update |
Debian DLA |
DLA-3362-1 | qemu security update |
EUVD |
EUVD-2021-26899 | An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0. |
Ubuntu USN |
USN-5009-1 | libslirp vulnerabilities |
Ubuntu USN |
USN-5009-2 | libslirp vulnerabilities |
Ubuntu USN |
USN-5010-1 | QEMU vulnerabilities |
Ubuntu USN |
USN-7094-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:06.527Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-3592
No data.
Status : Modified
Published: 2021-06-15T21:15:09.307
Modified: 2024-11-21T06:21:55.287
Link: CVE-2021-3592
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN