CVE-2024-3447

A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:netapp:hci_compute_node:-:*:*:*:*:*:*:*

History

03 Nov 2025, 20:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html -

Information

Published : 2024-11-14 12:15

Updated : 2025-11-03 20:16


NVD link : CVE-2024-3447

Mitre link : CVE-2024-3447

CVE.ORG link : CVE-2024-3447


JSON object : View

Products Affected

netapp

  • hci_compute_node

qemu

  • qemu
CWE
CWE-122

Heap-based Buffer Overflow