We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Reserved 2024-04-08 | Published 2024-11-14 | Updated 2024-11-14 | Assigner fedora2024-04-09: | Reported to Red Hat. |
2024-04-04: | Made public. |
Red Hat would like to thank Chuhong Yuan for reporting this issue.
access.redhat.com/security/cve/CVE-2024-3447
bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813
bugzilla.redhat.com/show_bug.cgi?id=2274123 (RHBZ#2274123)
patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/
Support options