QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
{
"binaries": [
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-block-extra"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-guest-agent"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-kvm"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-arm"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-common"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-mips"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-misc"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-ppc"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-s390x"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-sparc"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-system-x86"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-user"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-user-binfmt"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-user-static"
},
{
"binary_version": "1:2.11+dfsg-1ubuntu7.12",
"binary_name": "qemu-utils"
}
],
"availability": "No subscription required"
}