CVE-2024-8612
Description
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
QEMU virtio-scsi, virtio-blk, and virtio-crypto devices incorrectly set the virtqueue_push size, causing uninitialized bounce buffer data to be written back to the guest, leading to an information leak.
Overview
A flaw in QEMU's virtio-scsi, virtio-blk, and virtio-crypto devices allows an information leak. The functions virtio_scsi_complete_req, virtio_blk_req_complete, and virtio_crypto_req_complete set the size parameter for virtqueue_push to a value larger than the actual data transmitted to the guest [1][3]. This discrepancy causes dma_memory_unmap to later write back more data than intended from the bounce buffer, including uninitialized memory regions [1][3].
Exploitation
An attacker would need to be able to trigger completion of I/O requests on the affected virtio devices within a guest VM. No special privileges outside the guest are required, but the attacker must be running code inside the VM that can interact with the virtio devices. The flaw is present in the data path where bounce buffers are used for DMA operations; when the unmap operation writes back the inflated size, stale or uninitialized data from the bounce buffer may be included [1][3].
Impact
Successful exploitation results in the guest VM receiving data beyond the intended I/O response. This extra data may contain fragments of host memory or other sensitive information, leading to an information leak from the host to an unprivileged guest [1][3]. The leak is limited to the contents of the bounce buffer and does not directly enable code execution or privilege escalation.
Mitigation
A commit upstream addresses the issue by refining bounce buffer handling and enforcing proper size limits [2]. Users are advised to update QEMU to a version containing this fix. As of publication, no workaround has been provided, and the vulnerability is not listed as exploited in KEV [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
30- osv-coords29 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%20Micro%205.5pkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qemu-linux-user&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/qemu&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Confidential%20Computing%20Technical%20Preview%2015%20SP6pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Micro%206.0pkg:rpm/suse/qemu&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/qemu&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/qemu-linux-user&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6
< 7.1.0-150500.49.24.1+ 28 more
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 8.2.7-150600.3.20.1
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 9.1.0-2.1
- (no CPE)range: < 8.2.7-150600.3.20.1
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 8.2.7-150600.3.20.1
- (no CPE)range: < 8.2.7-15061.6.coco15sp6.1
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 8.2.7-150600.3.20.1
- (no CPE)range: < 7.1.0-150500.49.24.1
- (no CPE)range: < 8.2.7-150600.3.20.1
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 5.2.0-150300.135.1
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 8.2.7-1.1
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 6.2.0-150400.37.37.3
- (no CPE)range: < 8.2.7-150600.3.20.1
Patches
1637b0aa13956Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.