ALT-BU-2015-2817-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-01652
Уязвимость библиотеки libpng, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации
Modified: 2025-04-12
CVE-2015-8540
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
- http://sourceforge.net/p/libpng/bugs/244/
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- http://www.debian.org/security/2016/dsa-3443
- http://www.openwall.com/lists/oss-security/2015/12/10/6
- http://www.openwall.com/lists/oss-security/2015/12/10/7
- http://www.openwall.com/lists/oss-security/2015/12/11/1
- http://www.openwall.com/lists/oss-security/2015/12/11/2
- http://www.openwall.com/lists/oss-security/2015/12/17/10
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/80592
- https://access.redhat.com/errata/RHSA-2016:1430
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201611-08
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
- http://sourceforge.net/p/libpng/bugs/244/
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- http://www.debian.org/security/2016/dsa-3443
- http://www.openwall.com/lists/oss-security/2015/12/10/6
- http://www.openwall.com/lists/oss-security/2015/12/10/7
- http://www.openwall.com/lists/oss-security/2015/12/11/1
- http://www.openwall.com/lists/oss-security/2015/12/11/2
- http://www.openwall.com/lists/oss-security/2015/12/17/10
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/80592
- https://access.redhat.com/errata/RHSA-2016:1430
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201611-08
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-12035
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2016-00272
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое неустановленное воздействие
Modified: 2021-03-23
BDU:2017-00757
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии в гостевой операционной системе
Modified: 2021-03-23
BDU:2017-01030
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-6855
hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://www.debian.org/security/2015/dsa-3361
- http://www.debian.org/security/2015/dsa-3362
- http://www.openwall.com/lists/oss-security/2015/09/10/1
- http://www.openwall.com/lists/oss-security/2015/09/10/2
- http://www.securityfocus.com/bid/76691
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html
- https://security.gentoo.org/glsa/201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://www.debian.org/security/2015/dsa-3361
- http://www.debian.org/security/2015/dsa-3362
- http://www.openwall.com/lists/oss-security/2015/09/10/1
- http://www.openwall.com/lists/oss-security/2015/09/10/2
- http://www.securityfocus.com/bid/76691
- http://www.ubuntu.com/usn/USN-2745-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html
- https://security.gentoo.org/glsa/201602-01
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Modified: 2025-04-12
CVE-2015-7295
hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/09/18/5
- http://www.openwall.com/lists/oss-security/2015/09/18/9
- http://www.securityfocus.com/bid/82672
- https://security.gentoo.org/glsa/201602-01
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/09/18/5
- http://www.openwall.com/lists/oss-security/2015/09/18/9
- http://www.securityfocus.com/bid/82672
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-7504
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/2
- http://www.securityfocus.com/bid/78227
- http://www.securitytracker.com/id/1034268
- http://xenbits.xen.org/xsa/advisory-162.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/2
- http://www.securityfocus.com/bid/78227
- http://www.securitytracker.com/id/1034268
- http://xenbits.xen.org/xsa/advisory-162.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03
Modified: 2025-04-12
CVE-2015-7512
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/78230
- http://www.securitytracker.com/id/1034527
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/78230
- http://www.securitytracker.com/id/1034527
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-7549
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/14/2
- http://www.securityfocus.com/bid/80761
- https://bugzilla.redhat.com/show_bug.cgi?id=1291137
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/14/2
- http://www.securityfocus.com/bid/80761
- https://bugzilla.redhat.com/show_bug.cgi?id=1291137
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-8345
The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/25/11
- http://www.securityfocus.com/bid/77985
- https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html
- https://security.gentoo.org/glsa/201602-01
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/25/11
- http://www.securityfocus.com/bid/77985
- https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-8504
Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/08/7
- http://www.securityfocus.com/bid/78708
- https://bugzilla.redhat.com/show_bug.cgi?id=1289541
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/12/08/7
- http://www.securityfocus.com/bid/78708
- https://bugzilla.redhat.com/show_bug.cgi?id=1289541
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-20
CVE-2015-8556
Local privilege escalation vulnerability in the Gentoo QEMU package before 2.5.0-r1.
- http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html
- https://security.gentoo.org/glsa/201602-01
- https://www.exploit-db.com/exploits/39010/
- http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html
- https://security.gentoo.org/glsa/201602-01
- https://www.exploit-db.com/exploits/39010/
Modified: 2025-04-20
CVE-2015-8666
Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
- http://www.openwall.com/lists/oss-security/2015/12/24/1
- http://www.securityfocus.com/bid/79670
- https://bugzilla.redhat.com/show_bug.cgi?id=1283722
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
- http://www.openwall.com/lists/oss-security/2015/12/24/1
- http://www.securityfocus.com/bid/79670
- https://bugzilla.redhat.com/show_bug.cgi?id=1283722
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-12
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/3
- http://www.openwall.com/lists/oss-security/2016/01/04/6
- http://www.securityfocus.com/bid/79821
- http://www.securitytracker.com/id/1034576
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/3
- http://www.openwall.com/lists/oss-security/2016/01/04/6
- http://www.securityfocus.com/bid/79821
- http://www.securitytracker.com/id/1034576
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871
- https://security.gentoo.org/glsa/201602-01
Modified: 2025-04-12
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/4
- http://www.openwall.com/lists/oss-security/2016/01/04/7
- http://www.securityfocus.com/bid/79822
- http://www.securitytracker.com/id/1034575
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- https://security.gentoo.org/glsa/201602-01
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2016/01/04/4
- http://www.openwall.com/lists/oss-security/2016/01/04/7
- http://www.securityfocus.com/bid/79822
- http://www.securitytracker.com/id/1034575
- https://bugzilla.redhat.com/show_bug.cgi?id=1270876
- https://security.gentoo.org/glsa/201602-01
Package claws-mail updated to version 3.13.1-alt1 for branch sisyphus in task 155166.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-8614
Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
- http://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=d390fa07f5548f3173dd9cc13b233db5ce934c82
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00000.html
- http://www.claws-mail.org/news.php
- http://www.debian.org/security/2016/dsa-3452
- http://www.openwall.com/lists/oss-security/2015/12/21/10
- http://www.openwall.com/lists/oss-security/2015/12/22/2
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
- https://security.gentoo.org/glsa/201606-11
- http://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=d390fa07f5548f3173dd9cc13b233db5ce934c82
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00000.html
- http://www.claws-mail.org/news.php
- http://www.debian.org/security/2016/dsa-3452
- http://www.openwall.com/lists/oss-security/2015/12/21/10
- http://www.openwall.com/lists/oss-security/2015/12/22/2
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
- https://security.gentoo.org/glsa/201606-11