"value":"A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"Exposure of Sensitive Information to an Unauthorized Actor",
"cweId":"CWE-200"
}
]
}
]
},
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"Red Hat",
"product":{
"product_data":[
{
"product_name":"Red Hat Enterprise Linux 6",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"defaultStatus":"unknown"
}
}
]
}
},
{
"product_name":"Red Hat Enterprise Linux 7",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"defaultStatus":"unknown"
}
},
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"defaultStatus":"unknown"
}
}
]
}
},
{
"product_name":"Red Hat Enterprise Linux 8",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"defaultStatus":"affected"
}
}
]
}
},
{
"product_name":"Red Hat Enterprise Linux 8 Advanced Virtualization",