USN-5009-1: libslirp vulnerabilities
15 July 2021
Several security issues were fixed in libslirp.
Releases
Packages
- libslirp - General purpose TCP-IP emulator library
Details
Qiuhao Li discovered that libslirp incorrectly handled certain header data
lengths. An attacker inside a guest could possibly use this issue to leak
sensitive information from the host. This issue only affected Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-29129, CVE-2020-29130)
It was discovered that libslirp incorrectly handled certain udp packets. An
attacker inside a guest could possibly use this issue to leak sensitive
information from the host. (CVE-2021-3592, CVE-2021-3593, CVE-2021-3594,
CVE-2021-3595)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
Related notices
- USN-5010-1: qemu-system-common, qemu-user-binfmt, qemu-user, qemu-system-x86-xen, qemu-system-gui, qemu-system-mips, qemu-system-x86-microvm, qemu-system-misc, qemu-system-sparc, qemu-guest-agent, qemu-user-static, qemu-system-data, qemu-kvm, qemu-system-x86, qemu, qemu-system-s390x, qemu-block-extra, qemu-utils, qemu-system, qemu-system-arm, qemu-system-ppc
- USN-5009-2: libslirp, libslirp0, libslirp-dev
- USN-7094-1: qemu-block-supplemental, qemu-keymaps, qemu-system-common, qemu-user-binfmt, qemu-user, qemu-system-x86-xen, qemu-system-gui, qemu-common, qemu-system-aarch64, qemu-system-mips, qemu-system-x86-microvm, qemu-system-misc, qemu-system-sparc, qemu-guest-agent, qemu-system-modules-spice, qemu-user-static, qemu-system-data, qemu-system-xen, qemu-kvm, qemu-system-x86, qemu, qemu-system-s390x, qemu-system-modules-opengl, qemu-block-extra, qemu-utils, qemu-system, qemu-system-arm, qemu-system-ppc