#VU63786 Improper Resource Shutdown or Release in QEMU - CVE-2022-26354


Vulnerability identifier: #VU63786

Vulnerability risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-26354

CWE-ID: CWE-404

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
QEMU
Client/Desktop applications / Virtualization software

Vendor: QEMU

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists in the vhost-vsock device of QEMU. A local user can trigger the error and gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

QEMU: 3.1.50 - 6.2.0


External links
https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf
https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html
https://security.netapp.com/advisory/ntap-20220425-0003/
https://bugzilla.redhat.com/show_bug.cgi?id=2063257


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability