Description
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
INFO
Published Date :
2024-09-20T17:50:21.635Z
Last Modified :
2025-11-08T08:56:18.036Z
Source :
redhat
AFFECTED PRODUCTS
The following products are affected by CVE-2024-8612 vulnerability.
| Vendors | Products |
|---|---|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-8612.