[security-announce] Qemu 2.1: Security update

Sona Sarmadi sona.sarmadi at enea.com
Tue Aug 25 07:46:43 CEST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

	Enea Linux Security Advisory

=========================================================
Product/package: Qemu 2.1
Severity: Low
CVE Name: CVE-2014-3640
=========================================================
This security update fixes NULL pointer deref in sosendto().

Signed patch and README files
================================
0029-qemu-slirp-CVE-2014-3640.patch
0029-qemu-slirp-CVE-2014-3640.patch.sig
0029-qemu-slirp-CVE-2014-3640.README.asc

Description
===========
The sosendto function in slirp/udp.c in QEMU before
2.1.2 allows local users to cause a denial of service
(NULL pointer dereference) by sending a udp packet
with a value of 0 in the source port and address,
which triggers access of an uninitialized socket.

Reference
==========
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640

How to apply the patches
=======================
 - Preparation
Make sure that you have an installation of Enea Linux and have
applied the existing patches in the right order

wget https://linux.enea.com/5.0-beta-m400/\
Enea-Linux-5.0-beta-m400.tar.gz
tar zxf Enea-Linux-5.0-beta-m400.tar.gz
cd Enea-Linux-5.0-beta-m400/poky
<Fetch and apply the existing patches >

 - Fetch, verify and apply the new patch
wget https://linux.enea.com/5.0-beta-m400/\
patches/0029-qemu-slirp-CVE-2014-3640.patch
wget https://linux.enea.com/5.0-beta-m400/\
patches/0029-qemu-slirp-CVE-2014-3640.patch.sig
gpg --verify 0029-qemu-slirp-CVE-2014-3640.patch.sig
patch -p1 < ./0029-qemu-slirp-CVE-2014-3640.patch

If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=wwSW
-----END PGP SIGNATURE-----



More information about the security-announce mailing list