CVE-2019-3812
19.02.2019, 14:29
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 2.10.0 ≤ 𝑥 ≤ 3.1.0 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 18.10 |
opensuse | leap | 42.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||||||||||
qemu-kvm |
|
Common Weakness Enumeration
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
- CWE-125 - Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.
References