#VU63786 Improper Resource Shutdown or Release in QEMU


Published: 2022-05-30

Vulnerability identifier: #VU63786

Vulnerability risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26354

CWE-ID: CWE-404

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
QEMU
Client/Desktop applications / Virtualization software

Vendor: QEMU

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists in the vhost-vsock device of QEMU. A local user can trigger the error and gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

QEMU: 3.1.50 - 6.2.0 rc2


External links
http://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf
http://lists.debian.org/debian-lts-announce/2022/04/msg00002.html
http://security.netapp.com/advisory/ntap-20220425-0003/
http://bugzilla.redhat.com/show_bug.cgi?id=2063257


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability