First published: Sun Mar 17 2019(Updated: )
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | <=1:3.1+dfsg-8+deb10u8<=1:3.1+dfsg-8+deb10u11 | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u3 1:8.1.2+ds-1 1:8.2.0+ds-1 |
QEMU | <=3.1.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8934 has a moderate severity rating due to the potential for information exposure in virtualized environments.
To fix CVE-2019-8934, update QEMU to a version higher than 3.1.0 or apply the necessary patches provided by your operating system distributor.
CVE-2019-8934 affects QEMU versions up to and including 3.1.0.
CVE-2019-8934 primarily impacts systems using QEMU virtualization, including Debian and openSUSE distributions.
CVE-2019-8934 describes an information exposure vulnerability where the hypervisor shares sensitive system attributes with a guest.