Medium severity6.5NVD Advisory· Published May 23, 2017· Updated May 13, 2026
CVE-2017-8379
CVE-2017-8379
Description
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
Affected products
8cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.openwall.com/lists/oss-security/2017/05/03/2nvdMailing ListPatchThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.htmlnvdMailing ListPatchThird Party Advisory
- www.securityfocus.com/bid/98277nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:2408nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201706-03nvdThird Party Advisory
News mentions
0No linked articles in our index yet.