
Cloud Vulnerability DB
A community-led vulnerabilities database
An integer overflow vulnerability (CVE-2022-0998) was discovered in the Linux kernel's virtio device driver code, specifically in the vhostvdpaconfig_validate function. The vulnerability was disclosed in March 2022 and affects Linux kernel versions through 5.16.18. This security flaw impacts the Linux kernel's virtual device driver implementation (NVD, CVE).
The vulnerability stems from an integer overflow issue in the way the vhostvdpaconfigvalidate function handles the return value of getconfigsize. Originally, the bug affected 32-bit systems due to improper type handling where a 'long' variable was used instead of 'sizet' for storing the configuration size (Kernel Patch, OSS Security).
When successfully exploited, this vulnerability could allow a local user to crash the system or potentially escalate their privileges. The vulnerability has received a CVSS score of 7.8 (HIGH), indicating significant potential impact on system security (NetApp Advisory).
The issue was addressed through two key commits: commit 3ed21c1451a1 ('vdpa: check that offsets are within bounds') and commit 870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 which changed the variable type from 'long' to 'size_t'. It's important to note that both patches should be applied together, as applying only the second patch could create additional security problems (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."