First published: Fri Apr 28 2017(Updated: )
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.9.1 | |
Debian GNU/Linux | =8.0 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8309 is classified as a moderate severity vulnerability due to its potential to cause denial of service through memory consumption.
To fix CVE-2017-8309, users should upgrade to versions of QEMU higher than 2.9.1 or apply security patches provided by their distribution.
CVE-2017-8309 is caused by a memory leak in the audio subsystem of QEMU that occurs when starting and stopping audio capture repeatedly.
CVE-2017-8309 affects QEMU versions up to and including 2.9.1 built with audio subsystem support.
Users running vulnerable versions of QEMU on their systems, particularly in high-load environments, are primarily impacted by CVE-2017-8309.