First published: Mon Jan 10 2022(Updated: )
A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.18 | 5.18 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 | |
Linux Kernel | <5.18 | |
Linux Kernel | =5.18 | |
Linux Kernel | =5.18-rc1 | |
Linux Kernel | =5.18-rc2 | |
Linux Kernel | =5.18-rc3 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0171 is a high-severity vulnerability that could allow a non-root user-level application to crash the host kernel.
To fix CVE-2022-0171, users should update their Linux kernel to version 5.18 or later.
CVE-2022-0171 affects Red Hat Enterprise Linux and Debian-based distributions with specific kernel versions listed.
Yes, CVE-2022-0171 poses a risk to virtualization security as it affects the KVM SEV API used in AMD CPUs.
There are currently no documented workarounds for CVE-2022-0171; the best approach is to apply the kernel update promptly.