{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T10:11:50.537","vulnerabilities":[{"cve":{"id":"CVE-2025-8860","sourceIdentifier":"patrick@puiterwijk.org","published":"2026-02-18T21:16:22.260","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in QEMU in the uefi-vars virtual device. When the guest writes to register UEFI_VARS_REG_BUFFER_SIZE, the .write callback `uefi_vars_write` is invoked. The function allocates a heap buffer without zeroing the memory, leaving the buffer filled with residual data from prior allocations. When the guest later reads from register UEFI_VARS_REG_PIO_BUFFER_TRANSFER, the .read callback `uefi_vars_read` returns leftover metadata or other sensitive process memory from the previously allocated buffer, leading to an information disclosure vulnerability."},{"lang":"es","value":"Se encontró una falla en el dispositivo virtual uefi-vars de QEMU. Cuando un invitado escribe en el registro UEFI_VARS_REG_BUFFER_SIZE, se invoca la función de devolución de llamada .write 'uefi_vars_write'. La función asigna un búfer de la pila sin poner a cero la memoria, dejando el búfer lleno de datos residuales de asignaciones anteriores. Cuando el invitado lee posteriormente del registro UEFI_VARS_REG_PIO_BUFFER_TRANSFER, la función de devolución de llamada .read 'uefi_vars_read' devuelve metadatos sobrantes u otra memoria sensible del proceso del búfer asignado previamente, lo que lleva a una vulnerabilidad de revelación de información."}],"metrics":{"cvssMetricV31":[{"source":"patrick@puiterwijk.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"patrick@puiterwijk.org","type":"Secondary","description":[{"lang":"en","value":"CWE-212"}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2025-8860","source":"patrick@puiterwijk.org"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2387588","source":"patrick@puiterwijk.org"}]}}]}