A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Tue, 24 Sep 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8 |
Tue, 24 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Sep 2024 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:enterprise_linux:8::crb |
|
References |
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-04-09T19:34:45.646Z
Updated: 2024-09-24T07:53:41.023Z
Reserved: 2024-04-08T07:32:08.366Z
Link: CVE-2024-3446
Vulnrichment
Updated: 2024-08-01T20:12:07.321Z
NVD
Status : Awaiting Analysis
Published: 2024-04-09T20:15:10.450
Modified: 2024-11-21T09:29:37.567
Link: CVE-2024-3446
Redhat