QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html - | |
References | () http://www.securityfocus.com/bid/107059 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/ - | |
References | () https://seclists.org/bugtraq/2019/May/76 - | |
References | () https://usn.ubuntu.com/3923-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4454 - | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 4.4 |
Information
Published : 2019-02-19 14:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3812
Mitre link : CVE-2019-3812
CVE.ORG link : CVE-2019-3812
JSON object : View
Products Affected
canonical
- ubuntu_linux
opensuse
- leap
fedoraproject
- fedora
qemu
- qemu