MGASA-2015-0149

Source
https://advisories.mageia.org/MGASA-2015-0149.html
Import Source
https://advisories.mageia.org/MGASA-2015-0149.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0149
Related
Published
2015-04-15T09:01:28Z
Modified
2015-04-15T08:47:40Z
Summary
Updated qemu packages fix security vulnerabilities
Details

Updated qemu packages fix security vulnerabilities:

A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table (PRDT) data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system (rhbz#1204919).

It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU (CVE-2015-1779).

References
Credits

Affected packages

Mageia:4 / qemu

Package

Name
qemu
Purl
pkg:rpm/mageia/qemu?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.2-1.9.mga4

Ecosystem specific

{
    "section": "core"
}