An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1970484 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/ | |
https://security.gentoo.org/glsa/202107-44 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210805-0004/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-06-15T00:00:00
Updated: 2023-03-14T00:00:00
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-3592
JSON object: View
NVD Information
Status : Modified
Published: 2021-06-15T21:15:09.307
Modified: 2023-11-07T03:38:08.397
Link: CVE-2021-3592
JSON object: View
Redhat Information
No data.
CWE