We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7730

Qemu-kvm: virtio-snd: heap buffer overflow in virtio_snd_pcm_in_cb()



Description

A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.

Reserved 2024-08-13 | Published 2024-11-14 | Updated 2024-11-14 | Assigner fedora


HIGH: 7.4CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Any version before 9.1.0
affected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2024-08-13:Reported to Red Hat.
2024-07-05:Made public.

References

access.redhat.com/security/cve/CVE-2024-7730 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2304289 (RHBZ#2304289) issue-tracking

cve.org (CVE-2024-7730)

nvd.nist.gov (CVE-2024-7730)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-7730

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.