CVE-2024-3446

A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Configurations

No configuration.

History

21 Nov 2024, 09:29

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2024-3446 - () https://access.redhat.com/security/cve/CVE-2024-3446 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2274211 - () https://bugzilla.redhat.com/show_bug.cgi?id=2274211 -
References () https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ - () https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ -

25 Sep 2024, 01:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:6964 -

18 Apr 2024, 08:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una doble vulnerabilidad gratuita en los dispositivos QEMU virtio (virtio-gpu, virtio-serial-bus, virtio-crypto), donde el indicador mem_reentrancy_guard no protege suficientemente contra problemas de reentrada de DMA. Este problema podría permitir que un invitado privilegiado malintencionado bloquee el proceso QEMU en el host, lo que provocaría una denegación de servicio o permitiría la ejecución de código arbitrario dentro del contexto del proceso QEMU en el host.
Summary (en) A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. (en) A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.

09 Apr 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-09 20:15

Updated : 2024-11-21 09:29


NVD link : CVE-2024-3446

Mitre link : CVE-2024-3446

CVE.ORG link : CVE-2024-3446


JSON object : View

Products Affected

No product.

CWE
CWE-415

Double Free