Vulnerability Name:

CVE-2022-26354 (CCN-222043)

Assigned:2022-02-28
Published:2022-02-28
Updated:2023-02-12
Summary:A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.
CVSS v3 Severity:3.2 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L)
2.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
2.5 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L)
2.2 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-772
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-26354

Source: XF
Type: UNKNOWN
qemu-cve202226354-dos(222043)

Source: CCN
Type: QEMU GIT Repository
vhost-vsock: detach the virqueue element in case of error

Source: secalert@redhat.com
Type: Patch, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:qemu:qemu:6.2.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7791
    P
    qemu-tools-7.1.0-150500.47.15 on GA media (Moderate)
    2023-06-12
    oval:com.redhat.rhsa:def:20225821
    P
    RHSA-2022:5821: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)
    2022-08-02
    oval:org.opensuse.security:def:42403
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:3618
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:95248
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:3759
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:95392
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:42307
    P
    Security update for qemu (Important)
    2022-07-04
    oval:org.opensuse.security:def:542
    P
    Security update for qemu (Important)
    2022-07-04
    oval:com.redhat.rhsa:def:20225263
    P
    RHSA-2022:5263: qemu-kvm security and bug fix update (Moderate)
    2022-07-01
    oval:org.opensuse.security:def:929
    P
    Security update for qemu (Important) (in QA)
    2022-06-13
    oval:org.opensuse.security:def:1681
    P
    Security update for qemu (Important) (in QA)
    2022-06-13
    BACK
    qemu qemu 6.2.0 -