CVE-2024-3447
NixOS vulnerability analysis and mitigation

Overview

A heap-based buffer overflow vulnerability (CVE-2024-3447) was discovered in the SDHCI device emulation of QEMU. The vulnerability was identified in April 2024 and affects QEMU's SD Host Controller Interface implementation. The issue occurs when both s->data_count and the size of s->fifo_buffer are set to 0x200, leading to an out-of-bound access (NVD, RedHat Bugzilla).

Technical details

The vulnerability is triggered when specific conditions are met in the SDHCI device emulation, specifically when both s->data_count and the size of s->fifo_buffer are set to 0x200. This results in a heap-based buffer overflow condition in the sdhciwritedataport function. The CVSS 3.1 score assigned by Fedora Project is 6.0 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability allows a malicious guest to crash the QEMU process on the host, resulting in a denial of service condition. The impact is limited to availability, with no direct impact on confidentiality or integrity (NVD, RedHat Bugzilla).

Mitigation and workarounds

A fix has been developed and committed to the QEMU project. The patch modifies the sdhciwritedataport function to properly handle excess data writes by discarding them instead of allowing buffer overflow. The fix has been implemented in the upstream QEMU repository (QEMU Patch).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48606HIGH7.8
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48625HIGH7
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48608MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48569MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-65799MEDIUM4.3
  • NixOSNixOS
  • memos
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management