A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
                
            References
                    Configurations
                    No configuration.
History
                    02 Oct 2025, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Nov 2024, 09:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
26 Sep 2024, 13:32
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
20 Sep 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-20 18:15
Updated : 2025-10-02 17:16
NVD link : CVE-2024-8612
Mitre link : CVE-2024-8612
CVE.ORG link : CVE-2024-8612
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
