CVE-2024-7730

A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
fedoraCNA
7.4 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
postponed
bookworm
no-dsa
bullseye (security)
vulnerable
trixie
1:10.0.0+ds-2
fixed
sid
1:10.0.2+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
plucky
Fixed 9.0.2+ds-4ubuntu8
released
oracular
Fixed 1:9.0.2+ds-4ubuntu5.1
released
noble
Fixed 1:8.2.2+ds-0ubuntu1.4
released
jammy
Fixed 1:6.2+dfsg-2ubuntu6.24
released
focal
Fixed 1:4.2-3ubuntu6.30
released
bionic
Fixed 1:2.11+dfsg-1ubuntu7.42+esm2
released
xenial
Fixed 1:2.5+dfsg-5ubuntu10.51+esm3
released
trusty
Fixed 2.0.0+dfsg-2ubuntu1.47+esm4
released