CVE-2019-8934

hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

History

21 Nov 2024, 04:50

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/02/21/1 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2019/02/21/1 - Mailing List, Patch
References () http://www.securityfocus.com/bid/107115 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107115 - Third Party Advisory, VDB Entry
References () https://lists.gnu.org/archive/html/qemu-devel/2019-02/msg04821.html - Exploit, Mailing List, Patch, Third Party Advisory () https://lists.gnu.org/archive/html/qemu-devel/2019-02/msg04821.html - Exploit, Mailing List, Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190411-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190411-0006/ - Third Party Advisory

Information

Published : 2019-03-21 16:01

Updated : 2024-11-21 04:50


NVD link : CVE-2019-8934

Mitre link : CVE-2019-8934

CVE.ORG link : CVE-2019-8934


JSON object : View

Products Affected

qemu

  • qemu

opensuse

  • leap
CWE
CWE-668

Exposure of Resource to Wrong Sphere