First published: Tue Feb 19 2019(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.2+ds-1 | |
QEMU KVM | >=2.10.0<=3.1.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3812 has been classified with a medium severity level due to the potential for local attackers to exploit vulnerabilities in QEMU.
To fix CVE-2019-3812, update QEMU to a version later than 3.1.0 or apply the corresponding patches provided by your Linux distribution.
CVE-2019-3812 affects QEMU versions from 2.10 to 3.1.0 across several Linux distributions including Debian, Fedora, and Ubuntu.
Exploiting CVE-2019-3812 allows a local attacker with permission to execute i2c commands to read up to 128 bytes of stack memory from the QEMU process.
The vulnerable versions include QEMU 2.10 up to 3.1.0 across various distributions, as well as certain packaged versions from Debian and other Linux systems.