CVE-2024-3446
Published: April 10, 2024Last modified: October 15, 2024
Description
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.2 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | HIGH |
User interaction | NONE |
Scope | CHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | qemu | Fixed (9.0.2-r0) |
Stream | qemu | Fixed (9.0.0-r0) |
References
- https://access.redhat.com/errata/RHSA-2024:6964
- https://access.redhat.com/security/cve/CVE-2024-3446
- https://bugzilla.redhat.com/show_bug.cgi?id=2274211
- https://patchew.org/QEMU/[email protected]/
- https://gitlab.com/qemu-project/qemu/-/commit/f4729ec39ad97a42ceaa7b5697f84f440ea6e5dc
- https://gitlab.com/qemu-project/qemu/-/commit/b4295bff25f7b50de1d9cc94a9c6effd40056bca
- https://gitlab.com/qemu-project/qemu/-/commit/ba28e0ff4d95b56dc334aac2730ab3651ffc3132