
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49154 affects the Linux kernel's KVM (Kernel Virtual Machine) SVM (Secure Virtual Machine) component. The vulnerability involves a potential system crash due to out-of-bounds guest IRQ handling in the svmupdatepiirte() function. This issue occurs when guestirq values from KVM_IRQFD API calls exceed valid bounds (Kernel Git).
The vulnerability exists in the svmupdatepiirte() function where a WARNON check for out-of-bounds guest IRQ values could trigger a system panic. The issue manifests when guestirq values from KVMIRQFD API calls exceed the irqrt->nrrt_entries bounds, leading to potential system crashes (Kernel Git).
When exploited, this vulnerability can cause a system crash (panic) in KVM/SVM environments, potentially leading to denial of service conditions (NVD).
The issue has been fixed by replacing the WARNON check with proper bounds checking and error handling, similar to the fix implemented for VMX in commit 3a8b0677fc61. The fix includes adding validation for guestirq values and proper error handling when out-of-bounds values are detected (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."