Unrated severityNVD Advisory· Published Nov 7, 2014· Updated May 6, 2026
CVE-2014-3640
CVE-2014-3640
Description
The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
Affected products
22cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*+ 12 more
- cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.htmlnvdPatchVendor Advisory
- lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04598.htmlnvdPatchVendor Advisory
- lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04707.htmlnvdPatchVendor Advisory
- rhn.redhat.com/errata/RHSA-2015-0349.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0624.htmlnvdThird Party Advisory
- www.debian.org/security/2014/dsa-3045nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2409-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
- www.debian.org/security/2014/dsa-3044nvd
News mentions
0No linked articles in our index yet.