3.8 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
by @fricklerhandwerk Activity log
- Created automatic suggestion
- @fricklerhandwerk accepted
Qemu-kvm: information leak in virtio devices
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
References
Affected products
- *
Matching in nixpkgs
pkgs.qemu
Generic and open source machine emulator and virtualizer
pkgs.qemu_kvm
Generic and open source machine emulator and virtualizer
pkgs.qemu_xen
Generic and open source machine emulator and virtualizer
pkgs.qemu-user
QEMU User space emulator - launch executables compiled for one CPU on another CPU
pkgs.qemu_full
Generic and open source machine emulator and virtualizer
pkgs.qemu_test
Generic and open source machine emulator and virtualizer
pkgs.qemu-utils
Generic and open source machine emulator and virtualizer
pkgs.armTrustedFirmwareQemu
Reference implementation of secure world software for ARMv8-A
Package maintainers
-
@lopsided98 Ben Wolsieffer <benwolsieffer@gmail.com>
-
@alyssais Alyssa Ross <hi@alyssa.is>
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
-
@hehongbo Hongbo