CVE-2022-26354

A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

12 Feb 2023, 22:15

Type Values Removed Values Added
Summary A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2022:5263', 'name': 'https://access.redhat.com/errata/RHSA-2022:5263', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2022-26354', 'name': 'https://access.redhat.com/security/cve/CVE-2022-26354', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2022:5821', 'name': 'https://access.redhat.com/errata/RHSA-2022:5821', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2022:5002', 'name': 'https://access.redhat.com/errata/RHSA-2022:5002', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2063257', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=2063257', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 21:22

Type Values Removed Values Added
Summary A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0. A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results.
References
  • (MISC) https://access.redhat.com/errata/RHSA-2022:5263 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2022-26354 -
  • (MISC) https://access.redhat.com/errata/RHSA-2022:5821 -
  • (MISC) https://access.redhat.com/errata/RHSA-2022:5002 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2063257 -

26 Oct 2022, 17:53

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202208-27 - (GENTOO) https://security.gentoo.org/glsa/202208-27 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

05 Sep 2022, 06:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html -

15 Aug 2022, 11:19

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-27 -

12 May 2022, 20:47

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5133 - (DEBIAN) https://www.debian.org/security/2022/dsa-5133 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220425-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220425-0003/ - Third Party Advisory

10 May 2022, 11:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5133 -

25 Apr 2022, 21:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220425-0003/ -

04 Apr 2022, 16:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html -

25 Mar 2022, 18:22

Type Values Removed Values Added
CPE cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 3.2
First Time Qemu qemu
Qemu
References (MISC) https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf - (MISC) https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf - Patch, Third Party Advisory
CWE CWE-772

16 Mar 2022, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-16 15:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-26354

Mitre link : CVE-2022-26354

CVE.ORG link : CVE-2022-26354


JSON object : View

Products Affected

debian

  • debian_linux

qemu

  • qemu
CWE
CWE-772

Missing Release of Resource after Effective Lifetime