[security-announce] qemu: Security update

Sona Sarmadi sona.sarmadi at enea.com
Tue Jun 9 14:41:30 CEST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

	Enea Linux Security Advisory

=========================================================
Product/package: qemu 1.7.2
Severity: Moderate
CVE Names: CVE-2014-7840
=========================================================
This security update fixes insufficient parameter validation
during ram load.

The patch and README files are gpg signed by ESRT (Enea Security
Response Team) for verification of origin.
To verify the integrity of patches download the ESRT public Key from:
https://pgp.mit.edu/pks/lookup?op=vindex&search=0x773EF6EF68716A14

For detailed info refer to https://linux.enea.com/4.0/patches/README.asc

Signed patch and README files
================================
0079-qemu-CVE-2014-7840.README.asc
0079-qemu-CVE-2014-7840.patch.asc

Descriptions
============
The host_from_stream_offset function in arch_init.c in QEMU,
when loading RAM during migration, allows remote attackers to
execute arbitrary code via a crafted (1) offset or (2) length
value in savevm data.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840

How to apply the patches
=======================
 - Preparation
Make sure that you have an installation of Enea Linux and have
applied the existing patches in the right order.

wget https://linux.enea.com/4.0/Enea-Linux-4.0.tar.gz
tar zxf Enea-Linux-4.0.tar.gz
cd Enea-Linux-4.0/poky/
<Fetch and apply the existing patches >

 - Fetch and apply the new patch
wget https://linux.enea.com/4.0/patches/0079-qemu-CVE-2014-7840.patch.as
c
patch -p1 < ./0079-qemu-CVE-2014-7840.patch.asc

If you have any questions regarding the security patches and security
updates please contact security at enea.com.

Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJVdt76AAoJEHc+9u9ocWoUejQP/ixgCKTFDX4TjBE2dPVIfOtV
BZ+Rw58+9YD9RejriwXm4+ckTlICfOCc5ukxQGdWIu4qa4b+uaET+eDVD4xE6/xa
c7b/x79OZ3GJSAwfaN+7NCJ6hd+kKwlrjbfi9Ujna7g/zM9SeVj/T+tHQrvGHZtO
HtgtCZqKJBRAyv2Cm+2qkVd5O4k5PvEzzLbed1wAz0yleMmjbnUf0oyHeKDL0Pyl
7OZ16MQKvTpuNVf7nnvhYa5UUwU5djcRs7SzNpDoEYR3ui6RaPg+UIe7/QZDcOGB
uOZZh13/eJi3Xjp2umbP4rV50dvAi1Xj10G6PKzp0hs1lJ79ATw0uHJ87dFj+2PI
PExDQyDKQmMF8ARUhSMPQmrZUp6wN9Jcqdt6UKnukGS/UNeVka5ukjwfcnlVKYVP
QfiETyjq1BOWA8+0mzc48+XT1t65msARewG4GJEJ0GULFfBF5cFHou6t4WD6Kn7O
D1HdjK6dF7qWMIyAf7KZxyPgddNx3GB+AW+1M33khyDCnW6TTQ3Ot0CbjkkiOG1c
5AOMuQowUXsKL82h8BSEiLLJucIq99/SRy7qskNSOWa60tH1mA5Xv6jydboi3Yyl
V0bqqAS5wxdvL5JqT4jqhM7bnB5ZOopt2C44GHRrdbjVS0YTbQaPzYwtAsntSkmZ
JreRG11LHN67z8dBEOHG
=tW+i
-----END PGP SIGNATURE-----


More information about the security-announce mailing list