CVE-2022-49788
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the Linux kernel's VMware VMCI (Virtual Machine Communication Interface) driver, specifically in the vmcihostdoreceivedatagram() function. The issue involves a struct vmcieventqp allocated by qpnotifypeer() that contains padding which may leak uninitialized data to userspace. This vulnerability was assigned CVE-2022-49788 and was publicly disclosed on May 1, 2025 (Wiz Report).

Technical details

The vulnerability is an information leak in the Linux kernel's misc/vmwvmci driver. The issue occurs when the struct vmcieventqp is allocated by qpnotifypeer(), where padding bytes in the structure may contain uninitialized kernel data that gets exposed to userspace through vmcihostdoreceivedatagram(). The vulnerability was detected by the Kernel Memory Sanitizer (KMSAN) which identified the information leak during copyto_user operations. Specifically, the leak affects bytes 28-31 of a 48-byte memory region (NVD).

Impact

The vulnerability could lead to the disclosure of sensitive kernel memory contents to unprivileged users, potentially exposing sensitive information (Wiz Report).

Mitigation and workarounds

The recommended fix is to use memset() to prevent the information leaks. Additionally, qpnotifypeer_local() was speculatively fixed as it may have been affected by the same issue (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management