First published: Tue Apr 09 2024(Updated: )
It was found that the mem_reentrancy_guard flag did not sufficiently protect against DMA reentrancy issues in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), leading to a double free vulnerability. A malicious privileged guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. Upstream patch: <a href="https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/">https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2274211 is considered critical due to the potential for a malicious privileged guest to crash the QEMU process.
To fix REDHAT-BUG-2274211, apply the latest patches provided by the QEMU development team.
REDHAT-BUG-2274211 affects QEMU virtio devices including virtio-gpu, virtio-serial-bus, and virtio-crypto.
The vulnerability in REDHAT-BUG-2274211 is caused by insufficient protection against DMA reentrancy issues due to the mem_reentrancy_guard flag.
Exploiting REDHAT-BUG-2274211 does not directly allow for remote code execution, but it can crash the QEMU process, which may lead to denial of service.