First published: Tue Jan 24 2017(Updated: )
Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
QEMU KVM | =2.9.0-rc0 | |
QEMU KVM | =2.9.0-rc1 | |
QEMU KVM | =2.9.0-rc2 | |
QEMU KVM | =2.9.0-rc3 | |
QEMU KVM | =2.9.0-rc4 | |
QEMU KVM | =2.9.0-rc5 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5579 is considered a medium severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2017-5579, you should upgrade QEMU to the latest version that addresses this memory leak issue.
CVE-2017-5579 affects local guest OS privileged users running vulnerable versions of QEMU.
The main impacts of CVE-2017-5579 are host memory consumption and potential crashes of the QEMU process.
Versions of QEMU from 2.8.1.1 up to 2.9.0-rc5 are vulnerable to CVE-2017-5579.