CVE-2022-0171

medium

Description

A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).

References

https://www.debian.org/security/2022/dsa-5257

https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b

https://bugzilla.redhat.com/show_bug.cgi?id=2038940

https://access.redhat.com/security/cve/CVE-2022-0171

Details

Source: Mitre, NVD

Published: 2022-08-26

Updated: 2023-07-21

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium