ArchLinux: 202012-7: libslirp: information disclosure
Summary
- CVE-2020-29129 (information disclosure)
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it
tries to read a certain amount of header data even if that exceeds the
total packet length. A privileged guest user may use this flaw to
potentially leak host information bytes.
- CVE-2020-29130 (information disclosure)
slirp.c in libslirp through 4.3.1 has a buffer over-read because it
tries to read a certain amount of header data even if that exceeds the
total packet length. A privileged guest user may use this flaw to
potentially leak host information bytes.
Resolution
Upgrade to 4.4.0-1.
# pacman -Syu "libslirp>=4.4.0-1"
The problems have been fixed upstream in version 4.4.0.
References
https://www.openwall.com/lists/oss-security/2020/11/27/1 https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f https://gitlab.com/qemu-project/;a=commitdiff;h=37c0c885d19a4c2d69faed891b5c02aaffbdccfb https://security.archlinux.org/CVE-2020-29129 https://security.archlinux.org/CVE-2020-29130
Workaround
None.