CVE-2024-8612
CVSS V2 None
CVSS V3 None
Description
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
Overview
- CVE ID
- CVE-2024-8612
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-09-20T17:50:21.635Z
- Last Modified Date
- 2024-09-20T18:00:48.795Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2024-8612 | vdb-entry x_refsource_REDHAT |
https://bugzilla.redhat.com/show_bug.cgi?id=2313760 | issue-tracking x_refsource_REDHAT |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-8612 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8612 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-10-06 06:24:06 | Added to TrackCVE |