vulnerability
Arch Linux: Information disclosure (CVE-2021-3594)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jun 15, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jun 15, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU before version 4.6.0. The flaw exists in the udp_input() function and could occur while processing a UDP packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-3594
- https://attackerkb.com/topics/CVE-2021-3594
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1970491
- URL-https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
- URL-https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
- URL-https://security.archlinux.org/ASA-202106-49
- URL-https://security.gentoo.org/glsa/202107-44
- URL-https://security.netapp.com/advisory/ntap-20210805-0004/
- CWE-824
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.