A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
                
            References
                    Configurations
                    No configuration.
History
                    02 May 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Nov 2024, 09:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2024-3446 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2274211 - | |
| References | () https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ - | 
25 Sep 2024, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
18 Apr 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host. | 
09 Apr 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-09 20:15
Updated : 2025-05-02 23:15
NVD link : CVE-2024-3446
Mitre link : CVE-2024-3446
CVE.ORG link : CVE-2024-3446
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-415
                        
            Double Free
