Quick Emulator(Qemu) built with the CCID Card device emulator support is vulnerable to an integer overflow flaw. It could occur while passing message via command/responses packets to and from the host. A privileged user inside guest could use this flaw to crash the Qemu process on host resulting in DoS. Upstream patch: --------------- -> https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg01075.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/02/07/3
Acknowledgments: Name: Li Qiang (360.cn Inc.)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1419700]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1856 https://access.redhat.com/errata/RHSA-2017:1856
This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392