Vulnerability CVE-2017-8379: Information

Description

Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Published: May 23, 2017
Modified: Aug. 4, 2021
Error type identifier: CWE-772

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
[qemu-devel] 20170428 [PATCH] input: limit kbd queue depth
  • Mailing List
  • Patch
  • Third Party Advisory
98277
  • Third Party Advisory
  • VDB Entry
[oss-security] 20170503 CVE-2017-8379 Qemu: input: host memory lekage via keyboard
  • Mailing List
  • Patch
  • Third Party Advisory
GLSA-201706-03
  • Third Party Advisory
RHSA-2017:2408
  • Third Party Advisory
[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
      End including
      2.9.1

      Configuration 2

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*