CVE-2024-3447
Qemu: sdhci: heap buffer overflow in sdhci_write_dataport()
CVSS Score
6.0
EPSS Score
0.0%
EPSS Percentile
0th
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
| CWE | CWE-122 |
| Published | Nov 14, 2024 |
| Last Updated | Nov 3, 2025 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new medium vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8 Advanced Virtualization
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected References
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-3447 bugs.chromium.org: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2274123 patchew.org: https://patchew.org/QEMU/[email protected]/ security.netapp.com: https://security.netapp.com/advisory/ntap-20250425-0005/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html
Credits
Red Hat would like to thank Chuhong Yuan for reporting this issue.