Executive Summary

Informations
Name CVE-2024-8612 First vendor Publication 2024-09-20
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8612

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2024-8612
https://bugzilla.redhat.com/show_bug.cgi?id=2313760
https://security.netapp.com/advisory/ntap-20241108-0006/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-11-25 09:23:10
  • Multiple Updates
2024-09-26 17:27:37
  • Multiple Updates
2024-09-21 05:27:27
  • First insertion