
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in the KVM's AMD nested virtualization (SVM) implementation, identified as CVE-2022-3344. The vulnerability was found in October 2022, affecting Linux kernel versions up to 6.0.3. The issue occurs in the nested virtualization feature when handling shutdown execution in AMD processors (NVD, Ubuntu).
The vulnerability exists in the shutdown interception vmexit handler where kvmvcpureset is called. If running in nested mode and L1 doesn't intercept shutdown, the function resets the 'vcpu->arch.hflags' without properly leaving the nested state, leaving the vCPU in an inconsistent state. This can later trigger a kernel panic in SVM code. The vulnerability has a CVSS v3.1 base score of 5.5 (Medium), with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Kernel Patch, NVD).
When exploited, this vulnerability can lead to a page fault and kernel panic in the host (L0). The issue specifically affects systems using AMD processors with nested virtualization enabled, potentially causing denial of service conditions in the host system (NVD).
The issue has been fixed in Linux kernel version 6.1-rc7. Multiple distributions have released patches for their affected versions, including Ubuntu 22.04 LTS (jammy) and 22.10 (kinetic). The fix involves properly handling nested mode exit during vCPU reset operations (Ubuntu, Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."