Vulnerability Description
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | < 7.2.11 |
| Netapp | Hci Compute Node | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2024-3447Third Party Advisory
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813ExploitIssue Tracking
- https://bugzilla.redhat.com/show_bug.cgi?id=2274123Issue TrackingThird Party Advisory
- https://patchew.org/QEMU/[email protected]/Broken Link
- https://lists.debian.org/debian-lts-announce/2025/04/msg00042.html
- https://security.netapp.com/advisory/ntap-20250425-0005/Vendor Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-577017.html
FAQ
What is CVE-2024-3447?
CVE-2024-3447 is a vulnerability with a CVSS score of 6.0 (MEDIUM). A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bo...
How severe is CVE-2024-3447?
CVE-2024-3447 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3447?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Netapp Hci Compute Node.