[security-announce] Qemu 2.1: Security update

Sona Sarmadi sona.sarmadi at enea.com
Tue Aug 18 08:32:18 CEST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


	Enea Linux Security Advisory
=========================================================
Product/package: Qemu 2.1
Severity: Important
CVE Name: CVE-2014-7840
=========================================================
This security patch fixes insufficient parameter
validation during ram load.

Signed patch and README files
================================
0027-qemu-CVE-2014-7840.patch
0027-qemu-CVE-2014-7840.patch.sig
0027-qemu-CVE-2014-7840.README.asc

Description
===========
The host_from_stream_offset function in arch_init.c in QEMU,
when loading RAM during migration, allows remote attackers
to execute arbitrary code via a crafted (1) offset or (2)
length value in savevm data.

References
==========
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840

How to apply the patches
=======================
 - Preparation
Make sure that you have an installation of Enea Linux and have
applied the existing patches in the right order

wget https://linux.enea.com/5.0-beta-m400/\
Enea-Linux-5.0-beta-m400.tar.gz
tar zxf Enea-Linux-5.0-beta-m400.tar.gz
cd Enea-Linux-5.0-beta-m400/poky
<Fetch and apply the existing patches >

 - Fetch, verify and apply the new patch
wget https://linux.enea.com/5.0-beta-m400/\
patches/0027-qemu-CVE-2014-7840.patch
wget https://linux.enea.com/5.0-beta-m400/\
patches/0027-qemu-CVE-2014-7840.patch.sig
gpg --verify 0027-qemu-CVE-2014-7840.patch.sig
patch -p1 < ./0027-qemu-CVE-2014-7840.patch

If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=z9yH
-----END PGP SIGNATURE-----



More information about the security-announce mailing list