Double Free Vulnerability in QEMU Virtio Devices Could Lead to Denial of Service or Arbitrary Code Execution
CVE-2024-3446
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 9 April 2024
Summary
A double free vulnerability has been identified in QEMU's virtio devices, specifically affecting the virtio-gpu, virtio-serial-bus, and virtio-crypto components. This vulnerability arises from an insufficient safeguard in the mem_reentrancy_guard flag, which fails to adequately address Direct Memory Access (DMA) reentrancy issues. Exploitation of this vulnerability by a malicious privileged guest user could lead to a crash of the QEMU process on the host system. Additionally, it poses a risk of arbitrary code execution within the context of the QEMU process, potentially undermining the security integrity of the host environment.
Affected Version(s)
Red Hat Enterprise Linux 8 8100020240905091210.489197e6
Red Hat Enterprise Linux 8 8100020240905091210.489197e6
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved