CVE-2017-5898

Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
References
Link Resource
http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=c7dfbf322595ded4e70b626bf83158a9f3807c6a
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/07/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/96112 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1856 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2392 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1419699 Issue Tracking Patch
https://security.gentoo.org/glsa/201702-28 Patch Third Party Advisory VDB Entry
http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=c7dfbf322595ded4e70b626bf83158a9f3807c6a
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/07/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/96112 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1856 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2392 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1419699 Issue Tracking Patch
https://security.gentoo.org/glsa/201702-28 Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:ltss:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=c7dfbf322595ded4e70b626bf83158a9f3807c6a - () http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=c7dfbf322595ded4e70b626bf83158a9f3807c6a -
References () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/02/07/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/02/07/3 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/96112 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96112 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1856 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1856 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2392 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2392 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1419699 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1419699 - Issue Tracking, Patch
References () https://security.gentoo.org/glsa/201702-28 - Patch, Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201702-28 - Patch, Third Party Advisory, VDB Entry

07 Nov 2023, 02:49

Type Values Removed Values Added
References
  • {'url': 'http://git.qemu-project.org/?p=qemu.git;a=commit;h=c7dfbf322595ded4e70b626bf83158a9f3807c6a', 'name': 'http://git.qemu-project.org/?p=qemu.git;a=commit;h=c7dfbf322595ded4e70b626bf83158a9f3807c6a', 'tags': ['Issue Tracking', 'Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=c7dfbf322595ded4e70b626bf83158a9f3807c6a -

Information

Published : 2017-03-15 19:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5898

Mitre link : CVE-2017-5898

CVE.ORG link : CVE-2017-5898


JSON object : View

Products Affected

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_server_for_sap
  • linux_enterprise_desktop

qemu

  • qemu
CWE
CWE-190

Integer Overflow or Wraparound