SB20250226550 - Input validation error in Linux kernel kvm svm
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2022-49559)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nested_vmx_vmexit() function in arch/x86/kvm/vmx/nested.c, within the nested_svm_vmexit() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/45846661d10422ce9e22da21f8277540b29eca22
- https://git.kernel.org/stable/c/7de373c9b48229e428ecdb8fbde269c5a8617fd2
- https://git.kernel.org/stable/c/8d3a2aa0976f57320ba89baf9d57fb158dd0cd0d
- https://git.kernel.org/stable/c/f476a59d5c86c02a79eef893c6da86735f2977ac
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.13