An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2970-1 qemu security update
Debian DLA Debian DLA DLA-3362-1 qemu security update
EUVD EUVD EUVD-2021-26900 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Ubuntu USN Ubuntu USN USN-5009-1 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5009-2 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5010-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:01:07.949Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-3593

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-15T21:15:09.677

Modified: 2024-11-21T06:21:55.460

Link: CVE-2021-3593

cve-icon Redhat

Severity : Low

Publid Date: 2021-06-14T00:00:00Z

Links: CVE-2021-3593 - Bugzilla

cve-icon OpenCVE Enrichment

No data.