Description
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4454-1 | qemu security update |
EUVD |
EUVD-2019-13435 | QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host. |
Ubuntu USN |
USN-3923-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.499Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3812
No data.
Status : Modified
Published: 2019-02-19T14:29:00.193
Modified: 2024-11-21T04:42:35.553
Link: CVE-2019-3812
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN