CVE-2019-8934
Publication date 21 March 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Status
Package | Ubuntu Release | Status |
---|---|---|
qemu | 20.04 LTS focal |
Not affected
|
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Ignored | |
qemu-kvm | 20.04 LTS focal | Not in release |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Notes
mdeslaur
see debian bug for information on this change that may break existing functionnality. This fix will break ppc migration. we will not be fixing this issue in stable releases, marking as ignored
Patch details
Package | Patch details |
---|---|
qemu |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.3 · Low |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |