CVE-2022-26353
NixOS vulnerability analysis and mitigation

Overview

A flaw was discovered in the virtio-net device of QEMU version 6.2.0. This vulnerability (CVE-2022-26353) was inadvertently introduced with the fix for CVE-2021-3748, which failed to unmap the cached virtqueue elements on error. The issue was discovered in March 2022 and affects the memory management functionality of QEMU's network virtualization component (CVE Details, Red Hat CVE).

Technical details

The vulnerability stems from a previous fix attempt (commit bedd7e93) that was intended to address use-after-free issues in the scatter-gather (sg) handling by caching virtqueue elements in an array and unmapping them after receiving packets. However, the fix failed to implement proper unmapping of cached elements during error conditions. This oversight leads to memory leakage and other unexpected behaviors in the system. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: None, scope: Unchanged, and impact primarily affecting system availability (Ubuntu Security).

Impact

The primary impact of this vulnerability is memory leakage and potential system instability. When successfully exploited, it can lead to a Denial of Service (DoS) condition, affecting the availability of the system. The vulnerability has no direct impact on system confidentiality or integrity (NetApp Security).

Mitigation and workarounds

The vulnerability was fixed in QEMU version 7.0.0 through commit abe300d9, which implements proper unmapping of cached elements during error conditions. The fix involves detaching the cached elements on error to prevent memory leakage. Users are advised to upgrade to QEMU version 7.0.0 or later to address this vulnerability (QEMU Commit, QEMU Mailing List).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48606HIGH7.8
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48625HIGH7
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48608MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48569MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-65799MEDIUM4.3
  • NixOSNixOS
  • memos
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management