QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
History
                    21 Nov 2024, 04:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html - | |
| References | () http://www.securityfocus.com/bid/107059 - Third Party Advisory, VDB Entry | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/ - | |
| References | () https://seclists.org/bugtraq/2019/May/76 - | |
| References | () https://usn.ubuntu.com/3923-1/ - Third Party Advisory | |
| References | () https://www.debian.org/security/2019/dsa-4454 - | |
| CVSS | v2 : v3 : | v2 : 2.1 v3 : 4.4 | 
Information
                Published : 2019-02-19 14:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3812
Mitre link : CVE-2019-3812
CVE.ORG link : CVE-2019-3812
JSON object : View
Products Affected
                canonical
- ubuntu_linux
qemu
- qemu
fedoraproject
- fedora
opensuse
- leap
