The CAC(Common Access Card) library, used by Quick Emulator(Qemu) to implement smartcard support, is vulnerable to a host memory leakage issue. It could occur while allocating a new APDU object using guest supplied raw byte stream in 'vcard_apdu_new'. A guest user/process could use this flaw to leak host memory resulting in DoS. Upstream patch: --------------- -> https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/03/01/11
Acknowledgments: Name: Li Qiang (360.cn Inc.)
Created libcacard tracking bugs for this issue: Affects: fedora-all [bug 1427834]
Created libcacard tracking bugs for this issue: Affects: fedora-all [bug 1476037]
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Red Hat OpenStack Platform 11.0 (Ocata) Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Red Hat OpenStack Platform 8.0 (Liberty) Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:2408 https://access.redhat.com/errata/RHSA-2017:2408