An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2753-1 qemu security update
Debian DLA Debian DLA DLA-3362-1 qemu security update
EUVD EUVD EUVD-2021-26901 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Ubuntu USN Ubuntu USN USN-5009-1 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5009-2 libslirp vulnerabilities
Ubuntu USN Ubuntu USN USN-5010-1 QEMU vulnerabilities
Ubuntu USN Ubuntu USN USN-7094-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:01:07.408Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-3594

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-15T21:15:09.993

Modified: 2024-11-21T06:21:55.620

Link: CVE-2021-3594

cve-icon Redhat

Severity : Low

Publid Date: 2021-06-14T00:00:00Z

Links: CVE-2021-3594 - Bugzilla

cve-icon OpenCVE Enrichment

No data.