CVE-2022-49556

In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak For some sev ioctl interfaces, the length parameter that is passed maybe less than or equal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP firmware returns. In this case, kmalloc will allocate memory that is the size of the input rather than the size of the data. Since PSP firmware doesn't fully overwrite the allocated buffer, these sev ioctl interface may return uninitialized kernel slab memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Jan 2026, 20:55

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: SVM: Usar kzalloc para interfaces sev ioctl para evitar fugas de datos del kernel Para algunas interfaces sev ioctl, el parámetro de longitud que se pasa puede ser menor o igual a SEV_FW_BLOB_MAX_SIZE, pero mayor que los datos que devuelve el firmware de PSP. En este caso, kmalloc asignará memoria que sea del tamaño de la entrada en lugar del tamaño de los datos. Dado que el firmware de PSP no sobrescribe por completo el búfer asignado, estas interfaces sev ioctl pueden devolver memoria de losa de kernel no inicializada.
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/401bef1f95de92c3a8c6eece46e02fa88d7285ee - () https://git.kernel.org/stable/c/401bef1f95de92c3a8c6eece46e02fa88d7285ee - Patch
References () https://git.kernel.org/stable/c/57a01725339f9d82b099102ba2751621b1caab93 - () https://git.kernel.org/stable/c/57a01725339f9d82b099102ba2751621b1caab93 - Patch
References () https://git.kernel.org/stable/c/bbdcc644b59e01e98c68894a9fab42b9687f42b0 - () https://git.kernel.org/stable/c/bbdcc644b59e01e98c68894a9fab42b9687f42b0 - Patch
References () https://git.kernel.org/stable/c/d22d2474e3953996f03528b84b7f52cc26a39403 - () https://git.kernel.org/stable/c/d22d2474e3953996f03528b84b7f52cc26a39403 - Patch
References () https://git.kernel.org/stable/c/d8fdb4b24097472ff6b3c0559448200d420b1418 - () https://git.kernel.org/stable/c/d8fdb4b24097472ff6b3c0559448200d420b1418 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2026-01-22 20:55


NVD link : CVE-2022-49556

Mitre link : CVE-2022-49556

CVE.ORG link : CVE-2022-49556


JSON object : View

Products Affected

linux

  • linux_kernel