2024-12-08 03:06:42 +00:00

84 lines
3.0 KiB
JSON

{
"id": "CVE-2024-3446",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-09T20:15:10.450",
"lastModified": "2024-11-21T09:29:37.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una doble vulnerabilidad gratuita en los dispositivos QEMU virtio (virtio-gpu, virtio-serial-bus, virtio-crypto), donde el indicador mem_reentrancy_guard no protege suficientemente contra problemas de reentrada de DMA. Este problema podr\u00eda permitir que un invitado privilegiado malintencionado bloquee el proceso QEMU en el host, lo que provocar\u00eda una denegaci\u00f3n de servicio o permitir\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario dentro del contexto del proceso QEMU en el host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6964",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3446",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274211",
"source": "secalert@redhat.com"
},
{
"url": "https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3446",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274211",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}