Vulnerability Details : CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2024-3446
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-3446
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-3446
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.2
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.5
|
6.0
|
Red Hat, Inc. | 2024-04-09 |
CWE ids for CVE-2024-3446
-
The product calls free() twice on the same memory address.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2024-3446
-
https://access.redhat.com/errata/RHSA-2024:6964
RHSA-2024:6964 - Security Advisory - Red Hat カスタマーポータル
-
https://access.redhat.com/security/cve/CVE-2024-3446
CVE-2024-3446- Red Hat Customer Portal
-
https://security.netapp.com/advisory/ntap-20250502-0007/
-
https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
[v2] hw/virtio: Protect from more DMA re-entrancy bugs | Patchew
-
https://bugzilla.redhat.com/show_bug.cgi?id=2274211
2274211 – (CVE-2024-3446) CVE-2024-3446 QEMU: virtio: DMA reentrancy issue leads to double free vulnerability
Jump to