An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the ‘udphdr’ structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
[
{
"vendor": "n/a",
"product": "QEMU",
"versions": [
{
"version": "libslirp 4.6.0",
"status": "affected"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=1970487
lists.debian.org/debian-lts-announce/2022/04/msg00002.html
lists.debian.org/debian-lts-announce/2023/03/msg00013.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
security.gentoo.org/glsa/202107-44
security.netapp.com/advisory/ntap-20210805-0004/