Double Free Vulnerability in QEMU Virtio Devices Could Lead to Denial of Service or Arbitrary Code Execution
CVE-2024-3446

8.2HIGH

Summary

A double free vulnerability has been identified in QEMU's virtio devices, specifically affecting the virtio-gpu, virtio-serial-bus, and virtio-crypto components. This vulnerability arises from an insufficient safeguard in the mem_reentrancy_guard flag, which fails to adequately address Direct Memory Access (DMA) reentrancy issues. Exploitation of this vulnerability by a malicious privileged guest user could lead to a crash of the QEMU process on the host system. Additionally, it poses a risk of arbitrary code execution within the context of the QEMU process, potentially undermining the security integrity of the host environment.

Affected Version(s)

Red Hat Enterprise Linux 8 8100020240905091210.489197e6

Red Hat Enterprise Linux 8 8100020240905091210.489197e6

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Xiao Lei, Yiming Tao, and Yongkang Jia for reporting this issue.
.