CVE-2024-3446
📋 TL;DR
A double free vulnerability in QEMU's virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto) allows malicious privileged guest users to crash the QEMU host process or potentially execute arbitrary code on the host. This affects virtualization environments using QEMU with virtio device emulation. The vulnerability stems from insufficient protection against DMA reentrancy issues via the mem_reentrancy_guard flag.
💻 Affected Systems
- QEMU
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Privileged guest user achieves arbitrary code execution on the host with QEMU process privileges, potentially leading to host compromise and lateral movement.
Likely Case
Privileged guest user crashes the QEMU process, causing denial of service for all virtual machines running on that QEMU instance.
If Mitigated
With proper isolation and least privilege, impact is limited to denial of service affecting only the compromised guest's QEMU process.
🎯 Exploit Status
Exploitation requires privileged access within the guest VM and knowledge of triggering DMA reentrancy conditions. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check distribution-specific advisories (e.g., Red Hat RHSA-2024:6964)
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:6964
Restart Required: Yes
Instructions:
1. Check your distribution's security advisories for patched QEMU packages. 2. Update QEMU packages using your package manager (e.g., 'yum update qemu-kvm' for RHEL). 3. Restart all affected QEMU processes or reboot the host.
🔧 Temporary Workarounds
Disable vulnerable virtio devices
linuxRemove or disable virtio-gpu, virtio-serial-bus, and virtio-crypto devices from VM configurations if not required.
Edit VM configuration files to remove lines containing 'virtio-gpu', 'virtio-serial', or 'virtio-crypto' device definitions
🧯 If You Can't Patch
- Isolate QEMU processes using namespaces or containers to limit blast radius
- Implement strict access controls to prevent unauthorized privileged access to guest VMs
🔍 How to Verify
Check if Vulnerable:
Check QEMU version against patched versions in your distribution's security advisory. For RHEL: 'rpm -q qemu-kvm' and compare to RHSA-2024:6964.
Check Version:
qemu-system-x86_64 --version
Verify Fix Applied:
Verify QEMU package version matches patched version from advisory and test VM functionality with virtio devices.
📡 Detection & Monitoring
Log Indicators:
- QEMU process crashes with segmentation faults or double free errors in host system logs
- Unexpected QEMU process termination in virtualization management logs
Network Indicators:
- Sudden loss of connectivity to multiple VMs hosted on same QEMU instance
SIEM Query:
host_logs source="qemu" AND (message="segmentation fault" OR message="double free")
🔗 References
- https://access.redhat.com/errata/RHSA-2024:6964
- https://access.redhat.com/security/cve/CVE-2024-3446
- https://bugzilla.redhat.com/show_bug.cgi?id=2274211
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://access.redhat.com/security/cve/CVE-2024-3446
- https://bugzilla.redhat.com/show_bug.cgi?id=2274211
- https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
- https://security.netapp.com/advisory/ntap-20250502-0007/