USN-5009-2: libslirp vulnerabilities
26 October 2021
Several security issues were fixed in libslirp.
Releases
Packages
- libslirp - General purpose TCP-IP emulator library
Details
USN-5009-1 fixed vulnerabilities in libslirp. This update provides the
corresponding updates for Ubuntu 21.10.
Original advisory details:
Qiuhao Li discovered that libslirp incorrectly handled certain header data
lengths. An attacker inside a guest could possibly use this issue to leak
sensitive information from the host. This issue only affected Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-29129, CVE-2020-29130)
It was discovered that libslirp incorrectly handled certain udp packets. An
attacker inside a guest could possibly use this issue to leak sensitive
information from the host. (CVE-2021-3592, CVE-2021-3593, CVE-2021-3594,
CVE-2021-3595)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-5009-1: libslirp, libslirp-dev, libslirp0
- USN-5010-1: qemu-user, qemu-kvm, qemu-system-mips, qemu-user-binfmt, qemu-guest-agent, qemu-block-extra, qemu-system-x86, qemu-system-ppc, qemu-system-arm, qemu-system-common, qemu-utils, qemu-system-x86-xen, qemu-system-gui, qemu, qemu-system-misc, qemu-system-x86-microvm, qemu-system-s390x, qemu-user-static, qemu-system-sparc, qemu-system, qemu-system-data
- USN-7094-1: qemu-user, qemu-kvm, qemu-keymaps, qemu-system-modules-spice, qemu-block-supplemental, qemu-system-mips, qemu-system-aarch64, qemu-user-binfmt, qemu-guest-agent, qemu-block-extra, qemu-system-x86, qemu-system-ppc, qemu-system-arm, qemu-system-common, qemu-system-xen, qemu-utils, qemu-system-x86-xen, qemu-system-gui, qemu, qemu-common, qemu-system-modules-opengl, qemu-system-misc, qemu-system-x86-microvm, qemu-system-s390x, qemu-user-static, qemu-system-sparc, qemu-system, qemu-system-data