An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1970491 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/ | |
https://security.gentoo.org/glsa/202107-44 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210805-0004/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-06-15T00:00:00
Updated: 2023-03-14T00:00:00
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-3594
JSON object: View
NVD Information
Status : Modified
Published: 2021-06-15T21:15:09.993
Modified: 2023-11-07T03:38:08.550
Link: CVE-2021-3594
JSON object: View
Redhat Information
No data.
CWE