First published: Fri Apr 28 2017(Updated: )
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.9.1 | |
Debian | =8.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8379 is considered a moderate severity vulnerability due to its potential to cause denial of service by local privileged users.
To fix CVE-2017-8379, you should update QEMU to version 2.9.2 or later, or apply patches provided by your vendor.
CVE-2017-8379 affects users of QEMU versions up to and including 2.9.1, as well as certain versions of Debian Linux and Red Hat OpenStack.
CVE-2017-8379 facilitates denial of service attacks by exploiting a memory leak in the keyboard input event handlers support in QEMU.
CVE-2017-8379 cannot be exploited remotely as it requires local privileged access to the guest OS.