qemu, qemu-kvm
2017-12-16 01:32
CVE-2017-8379 qemu
CVE-2017-8379 qemu-kvm
2017-06-16 18:42
2017-06-15 02:36
2017-05-26 05:03
2017-05-23 21:03
2017-05-16 18:03
2017-05-11 14:03
2017-05-10 23:55
2017-05-09 22:03
2017-05-03 21:03


Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
devel qemu 1:2.8+dfsg-3ubuntu3
xenial qemu 1:2.5+dfsg-5ubuntu10.14
yakkety qemu 1:2.6.1+dfsg-0ubuntu5.5
zesty qemu 1:2.8+dfsg-3ubuntu2.2


Release Package Reason
precise qemu-kvm not-affected
qemu DNE
precise/esm qemu-kvm not-affected
qemu DNE
trusty qemu-kvm DNE
qemu not-affected
vivid/ubuntu-core qemu-kvm DNE
qemu DNE
vivid/stable-phone-overlay qemu-kvm DNE
qemu DNE
xenial qemu-kvm DNE
yakkety qemu-kvm DNE
zesty qemu-kvm DNE
devel qemu-kvm DNE

Needs Triage

Release Package Reason
upstream qemu-kvm needs-triage
qemu needs-triage