First published: Tue Apr 09 2024(Updated: )
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3446 has been classified as a high-severity vulnerability due to its potential to allow a malicious user to crash the QEMU process.
To mitigate CVE-2024-3446, it is recommended to update QEMU to the latest version that includes security patches addressing this vulnerability.
CVE-2024-3446 affects various versions of QEMU that utilize virtio devices, specifically virtio-gpu, virtio-serial-bus, and virtio-crypto.
CVE-2024-3446 is a double free vulnerability that arises from insufficient protection against DMA reentrancy issues within QEMU.
CVE-2024-3446 requires a privileged guest user context for exploitation, meaning it cannot be directly exploited remotely without access to the guest environment.