First published: Fri Mar 11 2022(Updated: )
A flaw was found in the vhost-vsock device of QEMU. In case of error, vhost_vsock_common_send_transport_reset() did not detach the invalid element from the virtqueue before freeing its memory, leading to memory leakage or other unexpected results. Upstream commit: <a href="https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf">https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2063257 is classified as moderate due to potential memory leakage issues.
To fix REDHAT-BUG-2063257, update to the latest version of QEMU where the memory management issues are resolved.
REDHAT-BUG-2063257 is caused by a flaw in the vhost-vsock device's error handling, which fails to detach invalid elements from the virtqueue.
REDHAT-BUG-2063257 affects systems running the QEMU virtualization software that utilize the vhost-vsock device.
Currently, there is no documented workaround for REDHAT-BUG-2063257, and it is recommended to apply the necessary software update.