First published: Sun Sep 21 2014(Updated: )
The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
QEMU qemu | =2.0.0 | |
QEMU qemu | =2.0.0-rc0 | |
QEMU qemu | =2.0.0-rc1 | |
QEMU qemu | =2.0.0-rc2 | |
QEMU qemu | =2.0.0-rc3 | |
QEMU qemu | =2.0.2 | |
QEMU qemu | =2.1.0 | |
QEMU qemu | =2.1.0-rc0 | |
QEMU qemu | =2.1.0-rc1 | |
QEMU qemu | =2.1.0-rc2 | |
QEMU qemu | =2.1.0-rc3 | |
QEMU qemu | =2.1.0-rc5 | |
QEMU qemu | =2.1.1 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Hpc Node | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.