A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2153.json"
[
{
"source": "https://github.com/torvalds/linux/commit/7ec37d1cbe17d8189d9562178d8b29167fe1c31a",
"signature_type": "Function",
"digest": {
"function_hash": "311681964336850758001832756237709788637",
"length": 592.0
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c",
"function": "synic_set_irq"
},
"id": "CVE-2022-2153-0983fb63",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44",
"signature_type": "Function",
"digest": {
"function_hash": "236141692859104194805924284527845787940",
"length": 511.0
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c",
"function": "stimer_set_count"
},
"id": "CVE-2022-2153-31b32f94",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44",
"signature_type": "Function",
"digest": {
"function_hash": "159698652495089462496906748297966904881",
"length": 768.0
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c",
"function": "stimer_set_config"
},
"id": "CVE-2022-2153-72d5abe3",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/00b5f37189d24ac3ed46cb7f11742094778c46ce",
"signature_type": "Function",
"digest": {
"function_hash": "155083392847217695689693119079612128578",
"length": 636.0
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/lapic.c",
"function": "kvm_irq_delivery_to_apic_fast"
},
"id": "CVE-2022-2153-9116a050",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/00b5f37189d24ac3ed46cb7f11742094778c46ce",
"signature_type": "Line",
"digest": {
"line_hashes": [
"187105592737441508400729915052214632772",
"325787269007737388870605919809056944579",
"160142218307417342442199016804440264474",
"244618073923107999274603912201490598361"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/lapic.c"
},
"id": "CVE-2022-2153-a30dea7b",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44",
"signature_type": "Line",
"digest": {
"line_hashes": [
"144767208240788125968293236110447617169",
"151291343976487846843017883443174269225",
"33456394195722713993207772788848074429",
"314644559920648174922097426937136321197",
"62630179554940769134311055990536476163",
"287581172625807091541399818642861643208",
"215941274285328497083081231099279399179",
"201008852325361268143936923470487223060",
"310399580191061686035522754851208474998",
"180900297488649886830889262841193041434",
"24945333124997178904642563418795340973",
"222742567768228958426097832475669753701",
"161909565044517083227832761679342453605",
"146623241827252506690622809821342024662",
"298745171379699835835895249954246382380"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c"
},
"id": "CVE-2022-2153-b2a49abf",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44",
"signature_type": "Function",
"digest": {
"function_hash": "121512636321855499436014419000358118345",
"length": 1317.0
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c",
"function": "synic_set_msr"
},
"id": "CVE-2022-2153-d4c8934f",
"signature_version": "v1"
},
{
"source": "https://github.com/torvalds/linux/commit/7ec37d1cbe17d8189d9562178d8b29167fe1c31a",
"signature_type": "Line",
"digest": {
"line_hashes": [
"118260692969638936968707964582290018187",
"85525315177369756583883232155265255493",
"186185941668761933820824611340203609038"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "arch/x86/kvm/hyperv.c"
},
"id": "CVE-2022-2153-fc3ae0cd",
"signature_version": "v1"
}
]