{"id":"MGASA-2015-0149","summary":"Updated qemu packages fix security vulnerabilities","details":"Updated qemu packages fix security vulnerabilities:\n\nA denial of service flaw was found in the way QEMU handled malformed Physical\nRegion Descriptor Table (PRDT) data sent to the host's IDE and/or AHCI\ncontroller emulation. A privileged guest user could use this flaw to crash the\nsystem (rhbz#1204919).\n\nIt was found that the QEMU's websocket frame decoder processed incoming frames\nwithout limiting resources used to process the header and the payload. An\nattacker able to access a guest's VNC console could use this flaw to trigger a\ndenial of service on the host by exhausting all available memory and CPU\n(CVE-2015-1779).\n","modified":"2026-04-16T06:25:24.781947389Z","published":"2015-04-15T09:01:28Z","upstream":["CVE-2015-1779"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0149.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15561"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html"}],"affected":[{"package":{"name":"qemu","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/qemu?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.2-1.9.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0149.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}