Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 18 Feb 2019 13:21:59 +1000
From: Wade Mealing <>
Subject: CVE-2019-3812 - qemu - Out-of-bounds read in hw/i2c/i2c-ddc.c allows
 for memory disclosure

QEMU through version 2.10 through to 3.1.0 is vulnerable to an
out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c in the
function i2c_ddc() function. A local attacker with permission to
execute i2c commands could exploit this to read stack memory of the
qemu process on the host.

This was fixed upstream in commit 5b267840515730dbf6753495d5b7bd8b04ad1c

Systems without a monitor connected are affected, as are virtual
monitor is presented to virtual guests.  Systems with no graphics
cards attached to the virtual host are not affected.

This seems to be an information leak of stack contents which can be
used to defeat some kernel level protections and simplify further

Red Hat Bugzilla:

Github patch on qemu:


Wade Mealing

Product Security - Kernel, RHCE

Red Hat


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.