{"id":"MGASA-2015-0368","summary":"Updated qemu packages fix security vulnerabilities","details":"Updated qemu packages fix security vulnerabilities:\n\nQemu emulator built with the RTL8139 emulation support is vulnerable to an\ninformation leakage flaw. It could occur while processing network packets\nunder RTL8139 controller's C+ mode of operation. A guest user could use this\nflaw to read uninitialised Qemu heap memory up to 65K bytes (CVE-2015-5165).\n\nQemu emulator built with the VNC display driver is vulnerable to an infinite\nloop issue. It could occur while processing a CLIENT_CUT_TEXT message with\nspecially crafted payload message. A privileged guest user could use this flaw\nto crash the Qemu process on the host, resulting in DoS (CVE-2015-5239).\n\nQemu emulator built with the e1000 NIC emulation support is vulnerable to an\ninfinite loop issue. It could occur while processing transmit descriptor data\nwhen sending a network packet. A privileged user inside guest could use this\nflaw to crash the Qemu instance resulting in DoS (CVE-2015-6815).\n\nQemu emulator built with the IDE disk and CD/DVD-ROM emulation support is\nvulnerable to a divide by zero issue. It could occur while executing an IDE\ncommand WIN_READ_NATIVE_MAX to determine the maximum size of a drive. A\nprivileged user inside guest could use this flaw to crash the Qemu instance\nresulting in DoS (CVE-2015-6855).\n","modified":"2026-02-01T16:46:04.383558Z","published":"2015-09-15T14:55:06Z","related":["CVE-2015-5165","CVE-2015-5239","CVE-2015-6815","CVE-2015-6855"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0368.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16604"},{"type":"REPORT","url":"https://lists.fedoraproject.org/pipermail/package-announce/2015-September/165305.html"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2015/09/02/7"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2015/09/05/5"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2015/09/10/2"}],"affected":[{"package":{"name":"qemu","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/qemu?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.2-1.16.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0368.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}