http://www.mandriva.com/en/
______________________________
Package : qemu
Date : April 27, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated qemu packages fix security vulnerabilities:
A denial of service flaw was found in the way QEMU handled malformed
Physical Region Descriptor Table (PRDT) data sent to the host's IDE
and/or AHCI controller emulation. A privileged guest user could use
this flaw to crash the system (rhbz#1204919).
It was found that the QEMU's websocket frame decoder processed incoming
frames without limiting resources used to process the header and the
payload. An attacker able to access a guest's VNC console could use
this flaw to trigger a denial of service on the host by exhausting
all available memory and CPU (CVE-2015-1779).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
bc2beef4372b8b5e6f304b43ea0393
66b90d7aa493a9d5a4f211348fc3f1
963f9b67a4f17912f78a2f836eff57
Mandriva Business Server 2/X86_64:
50ec69a06c81554133e2b6498f80aa
3614812ed41087f722183a335dcf10
59781eb204137b664c40b646638259
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą