Bug 1665792 (CVE-2019-3812) - CVE-2019-3812 qemu: Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory disclosure
Summary: CVE-2019-3812 qemu: Out-of-bounds read in hw/i2c/i2c-ddc.c allows for memory ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-3812
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1678082 1678081 1679836 1690722
Blocks: 1660287
TreeView+ depends on / blocked
 
Reported: 2019-01-14 03:38 UTC by Sam Fowler
Modified: 2021-02-16 22:33 UTC (History)
41 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the QEMU process on the host.
Clone Of:
Environment:
Last Closed: 2019-06-10 10:45:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Sam Fowler 2019-01-14 03:38:45 UTC
QEMU through version 2.10 through to 3.1.0 is vulnerable to an out-of-bounds read
of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker
with permission to execute i2c commands could exploit this to read stack memory
of the qemu process on the host.

Systems without a monitor connected are affected, a virtual monitor is presented
to virtual guests.  Systems with no graphics cards attached to the virtual host
are not affected.

Upstream patch:
---------------
  -> https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c

Reference:
----------
  -> https://www.openwall.com/lists/oss-security/2019/02/18/1

Comment 1 Sam Fowler 2019-01-14 03:42:18 UTC
Acknowledgments:

Name: Michael Hanselmann (hansmi.ch)

Comment 7 Wade Mealing 2019-02-18 03:29:42 UTC
Created qemu tracking bugs for this issue:

Affects: epel-all [bug 1678082]
Affects: fedora-all [bug 1678081]


Note You need to log in before you can comment on or make changes to this bug.