CVE-2014-3640

Related Vulnerabilities: CVE-2014-3640  

A NULL pointer dereference flaw was found in the way QEMU handled UDP packets with a source port and address of 0 when QEMU's user networking was in use. A local guest user could use this flaw to crash the guest.

A NULL pointer dereference flaw was found in the way QEMU handled UDP packets with a source port and address of 0 when QEMU's user networking was in use. A local guest user could use this flaw to crash the guest.

Find out more about CVE-2014-3640 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the kvm package as shipped with Red Hat Enterprise
Linux 5.

Red Hat Product Security has rated this issue as having Low security impact.
Future qemu-kvm updates for Red Hat Enterprise Linux 6 and 7 may address this
issue. For additional information, refer to the Issue Severity
Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score 4.4
Base Metrics AV:L/AC:M/Au:S/C:N/I:N/A:C
Access Vector Local
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts (qemu-kvm-rhev) RHSA-2015:0624 2015-03-05
Red Hat Enterprise Linux 7 (qemu-kvm) RHSA-2015:0349 2015-03-05

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 qemu-kvm Will not fix
Red Hat Enterprise Linux 5 kvm Not affected

Acknowledgements

Red Hat would like to thank Xavier Mehrenberger and Stephane Duverger of Airbus for reporting this issue.