QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "qemu-system-misc": "1:2.11+dfsg-1ubuntu7.12", "qemu-guest-agent-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-block-extra-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-utils-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-user": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-arm-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-kvm": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-ppc-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-user-static": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-arm": "1:2.11+dfsg-1ubuntu7.12", "qemu": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-sparc": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-s390x-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-common-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-x86-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system": "1:2.11+dfsg-1ubuntu7.12", "qemu-guest-agent": "1:2.11+dfsg-1ubuntu7.12", "qemu-utils": "1:2.11+dfsg-1ubuntu7.12", "qemu-block-extra": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-misc-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-sparc-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-mips-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-x86": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-ppc": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-s390x": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-common": "1:2.11+dfsg-1ubuntu7.12", "qemu-user-static-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-system-mips": "1:2.11+dfsg-1ubuntu7.12", "qemu-user-dbgsym": "1:2.11+dfsg-1ubuntu7.12", "qemu-user-binfmt": "1:2.11+dfsg-1ubuntu7.12" } ] }