Impact: Moderate Public Date: 2019-02-18 CWE: CWE-119 Bugzilla: 1665792: CVE-2019-3812 qemu: Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory disclosure QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
Find out more about CVE-2019-3812 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 4.4 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | None |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat Virtualization 4 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 9.0 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 8.0 (Liberty) | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 14 | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 13.0 (Queens) | qemu-kvm-rhev | Not affected |
Red Hat OpenStack Platform 10 | qemu-kvm-rhev | Not affected |
Red Hat Enterprise Linux 7 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 5 | kvm | Not affected |
Red Hat Enterprise Linux 5 | xen | Not affected |