Bug 2265499 (CVE-2024-24474) - CVE-2024-24474 QEMU: esp: integer underflow leads to heap buffer overflow in esp_do_nodma()
Summary: CVE-2024-24474 QEMU: esp: integer underflow leads to heap buffer overflow in ...
Status: NEW
Alias: CVE-2024-24474
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Product Security
QA Contact:
Depends On: 2265500
TreeView+ depends on / blocked
Reported: 2024-02-22 12:04 UTC by Mauro Matteo Cascella
Modified: 2024-02-22 13:55 UTC (History)
12 users (show)

Fixed In Version: qemu-kvm 8.2.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the am53c974 SCSI controller emulation of QEMU. When an SCSI layer transfer is incorrectly terminated, it is possible for a TI command to cause an SCSI buffer overflow due to the expected transfer data length being less than the available data in the FIFO. When this occurs, the unsigned async_len variable underflows and becomes a large offset, which writes past the end of the allocated SCSI buffer. This flaw could allow a malicious guest to crash QEMU and cause a denial of service condition.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Mauro Matteo Cascella 2024-02-22 12:04:06 UTC
QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.

Upstream issue & fix:

Comment 1 Mauro Matteo Cascella 2024-02-22 12:07:29 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 2265500]

Note You need to log in before you can comment on or make changes to this bug.