8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Qemu: virtio: dma reentrancy issue leads to double free vulnerability
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
References
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- RHSA-2024:6964 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- RHSA-2024:6964 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-3446 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2274211 issue-tracking x_refsource_REDHAT x_transferred
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/ x_transferred
- https://security.netapp.com/advisory/ntap-20250502-0007/
Affected products
- *
- *
Matching in nixpkgs
pkgs.qemu
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_kvm
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_xen
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-user
QEMU User space emulator - launch executables compiled for one CPU on another CPU
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_full
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu_test
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.qemu-utils
Generic and open source machine emulator and virtualizer
-
nixos-unstable -
- nixpkgs-unstable 10.1.0
pkgs.canokey-qemu
CanoKey QEMU Virt Card
-
nixos-unstable -
- nixpkgs-unstable 0-unstable-2023-06-06
pkgs.ubootQemuX86
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_defconfig-2025.07
pkgs.ubootQemuX86_64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable x86_64_defconfig-2025.07
pkgs.ubootQemuAarch64
Boot loader for embedded systems
-
nixos-unstable -
- nixpkgs-unstable qemu_arm64_defconfig-2025.07
pkgs.qemu-python-utils
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.armTrustedFirmwareQemu
Reference implementation of secure world software for ARMv8-A
-
nixos-unstable -
- nixpkgs-unstable 2.13.0
pkgs.python312Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python313Packages.qemu
Python tooling used by the QEMU project to build, configure, and test QEMU
-
nixos-unstable -
- nixpkgs-unstable 0.6.1.0a1
pkgs.python312Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
pkgs.python313Packages.qemu-qmp
Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
-
nixos-unstable -
- nixpkgs-unstable 0.0.3
Package maintainers
-
@lopsided98 Ben Wolsieffer <benwolsieffer@gmail.com>
-
@oxalica oxalica <oxalicc@pm.me>
-
@devplayer0 Jack O'Sullivan <dev@nul.ie>
-
@DavHau David Hauer <d.hauer.it@gmail.com>
-
@brianmcgillion Brian McGillion <bmg.avoin@gmail.com>
-
@alyssais Alyssa Ross <hi@alyssa.is>
-
@hehongbo Hongbo
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@dezgeg Tuomas Tynkkynen <tuomas.tynkkynen@iki.fi>