|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0149 (qemu)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0149: Updated qemu packages fix security vulnerabilities
Date:  Wed, 15 Apr 2015 11:01:57 +0200
Message-ID:  <20150415090157.464444894B@valstar.mageia.org>

MGASA-2015-0149 - Updated qemu packages fix security vulnerabilities Publication date: 15 Apr 2015 URL: http://advisories.mageia.org/MGASA-2015-0149.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-1779 Description: Updated qemu packages fix security vulnerabilities: A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table (PRDT) data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system (rhbz#1204919). It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU (CVE-2015-1779). References: - https://bugs.mageia.org/show_bug.cgi?id=15561 - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 SRPMS: - 4/core/qemu-1.6.2-1.9.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds