Bug 2274123 (CVE-2024-3447) - CVE-2024-3447 QEMU: sdhci: heap buffer overflow in sdhci_write_dataport()
Summary: CVE-2024-3447 QEMU: sdhci: heap buffer overflow in sdhci_write_dataport()
Keywords:
Status: NEW
Alias: CVE-2024-3447
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2274124
Blocks: 2211418
TreeView+ depends on / blocked
 
Reported: 2024-04-09 09:04 UTC by Mauro Matteo Cascella
Modified: 2024-11-12 11:48 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2024-04-09 09:04:44 UTC
A heap based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Upstream patch:
https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/

oss-fuzz bug:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813

Comment 1 Mauro Matteo Cascella 2024-04-09 09:05:05 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 2274124]

Comment 2 Mauro Matteo Cascella 2024-04-09 16:55:22 UTC
Patch v2:
https://patchew.org/QEMU/20240409145524.27913-1-philmd@linaro.org/

Comment 3 Mauro Matteo Cascella 2024-11-12 11:48:40 UTC
Upstream commit:
https://gitlab.com/qemu-project/qemu/-/commit/9e4b27ca6bf4974f169bbca7f3dca117b1208b6f


Note You need to log in before you can comment on or make changes to this bug.