First published: Fri Sep 20 2024(Updated: )
A flaw was found in QEMU in the virtio-scsi, virtio-blk and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak. Upstream fix: <a href="https://gitlab.com/qemu-project/qemu/-/commit/637b0aa139565cb82a7b9269e62214f87082635c">https://gitlab.com/qemu-project/qemu/-/commit/637b0aa139565cb82a7b9269e62214f87082635c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2313760 is considered high due to potential data integrity issues.
To fix REDHAT-BUG-2313760, users should update to the latest version of QEMU that contains the patch addressing this vulnerability.
REDHAT-BUG-2313760 affects the virtio-scsi, virtio-blk, and virtio-crypto devices in QEMU.
Yes, REDHAT-BUG-2313760 could potentially lead to denial of service due to incorrect handling of data sizes.
REDHAT-BUG-2313760 impacts environments utilizing QEMU virtualization technology with the affected virtio devices.