Lucene search

K
archlinuxArchLinuxASA-202012-7
HistoryDec 05, 2020 - 12:00 a.m.

[ASA-202012-7] libslirp: information disclosure

2020-12-0500:00:00
security.archlinux.org
127

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.004 Low

EPSS

Percentile

72.7%

Arch Linux Security Advisory ASA-202012-7

Severity: Medium
Date : 2020-12-05
CVE-ID : CVE-2020-29129 CVE-2020-29130
Package : libslirp
Type : information disclosure
Remote : No
Link : https://security.archlinux.org/AVG-1305

Summary

The package libslirp before version 4.4.0-1 is vulnerable to
information disclosure.

Resolution

Upgrade to 4.4.0-1.

pacman -Syu β€œlibslirp>=4.4.0-1”

The problems have been fixed upstream in version 4.4.0.

Workaround

None.

Description

  • CVE-2020-29129 (information disclosure)

ncsi.c in libslirp through 4.3.1 has a buffer over-read because it
tries to read a certain amount of header data even if that exceeds the
total packet length. A privileged guest user may use this flaw to
potentially leak host information bytes.

  • CVE-2020-29130 (information disclosure)

slirp.c in libslirp through 4.3.1 has a buffer over-read because it
tries to read a certain amount of header data even if that exceeds the
total packet length. A privileged guest user may use this flaw to
potentially leak host information bytes.

Impact

A privileged guest user may be able to access sensitive information
from the host memory.

References

https://www.openwall.com/lists/oss-security/2020/11/27/1
https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=37c0c885d19a4c2d69faed891b5c02aaffbdccfb
https://security.archlinux.org/CVE-2020-29129
https://security.archlinux.org/CVE-2020-29130

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibslirp<Β 4.4.0-1UNKNOWN

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.004 Low

EPSS

Percentile

72.7%