We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3447

Qemu: sdhci: heap buffer overflow in sdhci_write_dataport()



Description

A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Reserved 2024-04-08 | Published 2024-11-14 | Updated 2024-11-14 | Assigner fedora


MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

Problem types

Heap-based Buffer Overflow

Product status

Default status
unaffected

1.5.0 before 9.0.0
affected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2024-04-09:Reported to Red Hat.
2024-04-04:Made public.

Credits

Red Hat would like to thank Chuhong Yuan for reporting this issue.

References

access.redhat.com/security/cve/CVE-2024-3447 vdb-entry

bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813

bugzilla.redhat.com/show_bug.cgi?id=2274123 (RHBZ#2274123) issue-tracking

patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/

cve.org (CVE-2024-3447)

nvd.nist.gov (CVE-2024-3447)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3447

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.