Description
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
Published: 2024-09-20
Score: 3.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-49297 A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
History

Thu, 02 Oct 2025 17:00:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00041}

epss

{'score': 0.00031}


Wed, 21 May 2025 08:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Fri, 20 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Sep 2024 18:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
Title qemu-kvm: information leak in virtio devices Qemu-kvm: information leak in virtio devices
First Time appeared Redhat
Redhat advanced Virtualization
Redhat enterprise Linux
CPEs cpe:/a:redhat:advanced_virtualization:8::el8
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat advanced Virtualization
Redhat enterprise Linux
References

Fri, 20 Sep 2024 15:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title qemu-kvm: information leak in virtio devices
Weaknesses CWE-200
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}

threat_severity

Low


Subscriptions

Redhat Advanced Virtualization Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-08T08:56:18.036Z

Reserved: 2024-09-09T16:25:22.769Z

Link: CVE-2024-8612

cve-icon Vulnrichment

Updated: 2024-11-08T15:02:52.687Z

cve-icon NVD

Status : Deferred

Published: 2024-09-20T18:15:04.743

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-8612

cve-icon Redhat

Severity : Low

Publid Date: 2024-09-20T00:00:00Z

Links: CVE-2024-8612 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses