A NULL pointer dereference flaw was found in the way QEMU handled UDP packets with a source port and address of 0 when QEMU's user networking was in use. A local guest user could use this flaw to crash the guest.
Find out more about CVE-2014-3640 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the kvm package as shipped with Red Hat Enterprise
Linux 5.
Red Hat Product Security has rated this issue as having Low security impact.
Future qemu-kvm updates for Red Hat Enterprise Linux 6 and 7 may address this
issue. For additional information, refer to the Issue Severity
Classification: https://access.redhat.com/security/updates/classification/.
Base Score | 4.4 |
---|---|
Base Metrics | AV:L/AC:M/Au:S/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts (qemu-kvm-rhev) | RHSA-2015:0624 | 2015-03-05 |
Red Hat Enterprise Linux 7 (qemu-kvm) | RHSA-2015:0349 | 2015-03-05 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | qemu-kvm | Will not fix |
Red Hat Enterprise Linux 5 | kvm | Not affected |