Bug 1222845 (CVE-2024-3447) - VUL-0: CVE-2024-3447: qemu: sdhci: heap buffer overflow in sdhci_write_dataport()
Summary: VUL-0: CVE-2024-3447: qemu: sdhci: heap buffer overflow in sdhci_write_datapo...
Status: IN_PROGRESS
Alias: CVE-2024-3447
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: E-mail List
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/400854/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-3447:6.0:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-15 13:16 UTC by SMASH SMASH
Modified: 2024-06-28 23:40 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-15 13:16:05 UTC
A heap based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Upstream patch:
https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/

oss-fuzz bug:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-3447
https://bugzilla.redhat.com/show_bug.cgi?id=2274123
Comment 1 Carlos López 2024-04-15 13:16:56 UTC
I'd say this affects all qemu versions we ship, since d7dfca0807 ("hw/sdhci: introduce standard SD host controller") is from 11 years ago.
Comment 2 Dario Faggioli 2024-04-16 15:32:01 UTC
(In reply to Carlos López from comment #1)
> I'd say this affects all qemu versions we ship, since d7dfca0807 ("hw/sdhci:
> introduce standard SD host controller") is from 11 years ago.

Right. Can I still have an hit about which ones are the relevant products/code-streams?

I'm asking because I can't find the score of the CVE... In the meantime, I'll do Factory, ALP, 15-SP6, 15-SP5 and 15-SP4
Comment 3 Dario Faggioli 2024-04-16 15:32:02 UTC
(In reply to Carlos López from comment #1)
> I'd say this affects all qemu versions we ship, since d7dfca0807 ("hw/sdhci:
> introduce standard SD host controller") is from 11 years ago.

Right. Can I still have an hit about which ones are the relevant products/code-streams?

I'm asking because I can't find the score of the CVE... In the meantime, I'll do Factory, ALP, 15-SP6, 15-SP5 and 15-SP4
Comment 4 Carlos López 2024-04-17 15:34:58 UTC
(In reply to Dario Faggioli from comment #3)
> (In reply to Carlos López from comment #1)
> > I'd say this affects all qemu versions we ship, since d7dfca0807 ("hw/sdhci:
> > introduce standard SD host controller") is from 11 years ago.
> 
> Right. Can I still have an hit about which ones are the relevant
> products/code-streams?
> 
> I'm asking because I can't find the score of the CVE... In the meantime,
> I'll do Factory, ALP, 15-SP6, 15-SP5 and 15-SP4

CVSS is 6.0. Non-LTSS codestreams are:
 - SUSE:SLE-12-SP3:Update
 - SUSE:SLE-12-SP5:Update
 - SUSE:SLE-15-SP2:Update
 - SUSE:SLE-15-SP3:Update
 - SUSE:SLE-15-SP4:Update
 - SUSE:SLE-15-SP5:Update
 - SUSE:SLE-15-SP6:Update
 - SUSE:ALP:Source:Standard:1.0
Comment 5 OBSbugzilla Bot 2024-04-18 10:15:06 UTC
This is an autogenerated message for OBS integration:
This bug (1222845) was mentioned in
https://build.opensuse.org/request/show/1168800 Factory / qemu
Comment 8 Maintenance Automation 2024-04-23 12:30:19 UTC
SUSE-SU-2024:1394-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1213269, 1218889, 1220134, 1222843, 1222845
CVE References: CVE-2023-3019, CVE-2023-6683, CVE-2024-24474, CVE-2024-3446, CVE-2024-3447
Maintenance Incident: [SUSE:Maintenance:33442](https://smelt.suse.de/incident/33442/)
Sources used:
openSUSE Leap 15.4 (src):
 qemu-linux-user-6.2.0-150400.37.29.1, qemu-6.2.0-150400.37.29.1
openSUSE Leap Micro 5.3 (src):
 qemu-6.2.0-150400.37.29.1
openSUSE Leap Micro 5.4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Micro 5.3 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Micro 5.4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Manager Proxy 4.3 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Manager Retail Branch Server 4.3 (src):
 qemu-6.2.0-150400.37.29.1
SUSE Manager Server 4.3 (src):
 qemu-6.2.0-150400.37.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2024-04-26 08:30:30 UTC
SUSE-SU-2024:1438-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1213269, 1218889, 1222843, 1222845
CVE References: CVE-2023-3019, CVE-2023-6683, CVE-2024-3446, CVE-2024-3447
Maintenance Incident: [SUSE:Maintenance:33445](https://smelt.suse.de/incident/33445/)
Sources used:
openSUSE Leap 15.5 (src):
 qemu-7.1.0-150500.49.15.1, qemu-linux-user-7.1.0-150500.49.15.1
SUSE Linux Enterprise Micro 5.5 (src):
 qemu-7.1.0-150500.49.15.1
Basesystem Module 15-SP5 (src):
 qemu-7.1.0-150500.49.15.1
SUSE Package Hub 15 15-SP5 (src):
 qemu-7.1.0-150500.49.15.1
Server Applications Module 15-SP5 (src):
 qemu-7.1.0-150500.49.15.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.