A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
References
Configurations
No configuration.
History
21 Nov 2024, 09:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-20 18:15
Updated : 2024-11-21 09:53
NVD link : CVE-2024-8612
Mitre link : CVE-2024-8612
CVE.ORG link : CVE-2024-8612
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor