CVE-2022-0171

Source
https://cve.org/CVERecord?id=CVE-2022-0171
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0171.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-0171
Downstream
Related
Published
2022-08-26T18:15:08.603Z
Modified
2026-02-11T01:38:15.289876Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
683412ccf61294d727ead4a73d97397396e69a6b

Affected versions

v2.*
v2.6.12
v2.6.12-rc2
v2.6.12-rc3
v2.6.12-rc4
v2.6.12-rc5
v2.6.12-rc6
v2.6.13
v2.6.13-rc1
v2.6.13-rc2
v2.6.13-rc3
v2.6.13-rc4
v2.6.13-rc5
v2.6.13-rc6
v2.6.13-rc7
v2.6.14
v2.6.14-rc1
v2.6.14-rc2
v2.6.14-rc3
v2.6.14-rc4
v2.6.14-rc5
v2.6.15
v2.6.15-rc1
v2.6.15-rc2
v2.6.15-rc3
v2.6.15-rc4
v2.6.15-rc5
v2.6.15-rc6
v2.6.15-rc7
v2.6.16
v2.6.16-rc1
v2.6.16-rc2
v2.6.16-rc3
v2.6.16-rc4
v2.6.16-rc5
v2.6.16-rc6
v2.6.17
v2.6.17-rc1
v2.6.17-rc2
v2.6.17-rc3
v2.6.17-rc4
v2.6.17-rc5
v2.6.17-rc6
v2.6.18
v2.6.18-rc1
v2.6.18-rc2
v2.6.18-rc3
v2.6.18-rc4
v2.6.18-rc5
v2.6.18-rc6
v2.6.18-rc7
v2.6.19
v2.6.19-rc1
v2.6.19-rc2
v2.6.19-rc3
v2.6.19-rc4
v2.6.19-rc5
v2.6.19-rc6
v2.6.20
v2.6.20-rc1
v2.6.20-rc2
v2.6.20-rc3
v2.6.20-rc4
v2.6.20-rc5
v2.6.20-rc6
v2.6.20-rc7
v2.6.21
v2.6.21-rc1
v2.6.21-rc2
v2.6.21-rc3
v2.6.21-rc4
v2.6.21-rc5
v2.6.21-rc6
v2.6.21-rc7
v2.6.22
v2.6.22-rc1
v2.6.22-rc2
v2.6.22-rc3
v2.6.22-rc4
v2.6.22-rc5
v2.6.22-rc6
v2.6.22-rc7
v2.6.23
v2.6.23-rc1
v2.6.23-rc2
v2.6.23-rc3
v2.6.23-rc4
v2.6.23-rc5
v2.6.23-rc6
v2.6.23-rc7
v2.6.23-rc8
v2.6.23-rc9
v2.6.24
v2.6.24-rc1
v2.6.24-rc2
v2.6.24-rc3
v2.6.24-rc4
v2.6.24-rc5
v2.6.24-rc6
v2.6.24-rc7
v2.6.24-rc8
v2.6.25
v2.6.25-rc1
v2.6.25-rc2
v2.6.25-rc3
v2.6.25-rc4
v2.6.25-rc5
v2.6.25-rc6
v2.6.25-rc7
v2.6.25-rc8
v2.6.25-rc9
v2.6.26
v2.6.26-rc1
v2.6.26-rc2
v2.6.26-rc3
v2.6.26-rc4
v2.6.26-rc5
v2.6.26-rc6
v2.6.26-rc7
v2.6.26-rc8
v2.6.26-rc9
v2.6.27
v2.6.27-rc1
v2.6.27-rc2
v2.6.27-rc3
v2.6.27-rc4
v2.6.27-rc5
v2.6.27-rc6
v2.6.27-rc7
v2.6.27-rc8
v2.6.27-rc9
v2.6.28
v2.6.28-rc1
v2.6.28-rc2
v2.6.28-rc3
v2.6.28-rc4
v2.6.28-rc5
v2.6.28-rc6
v2.6.28-rc7
v2.6.28-rc8
v2.6.28-rc9
v2.6.29
v2.6.29-rc1
v2.6.29-rc2
v2.6.29-rc3
v2.6.29-rc4
v2.6.29-rc5
v2.6.29-rc6
v2.6.29-rc7
v2.6.29-rc8
v2.6.30
v2.6.30-rc1
v2.6.30-rc2
v2.6.30-rc3
v2.6.30-rc4
v2.6.30-rc5
v2.6.30-rc6
v2.6.30-rc7
v2.6.30-rc8
v2.6.31
v2.6.31-rc1
v2.6.31-rc2
v2.6.31-rc3
v2.6.31-rc4
v2.6.31-rc5
v2.6.31-rc6
v2.6.31-rc7
v2.6.31-rc8
v2.6.31-rc9
v2.6.32
v2.6.32-rc1
v2.6.32-rc2
v2.6.32-rc3
v2.6.32-rc4
v2.6.32-rc5
v2.6.32-rc6
v2.6.32-rc7
v2.6.32-rc8
v2.6.33
v2.6.33-rc1
v2.6.33-rc2
v2.6.33-rc3
v2.6.33-rc4
v2.6.33-rc5
v2.6.33-rc6
v2.6.33-rc7
v2.6.33-rc8
v2.6.34
v2.6.34-rc1
v2.6.34-rc2
v2.6.34-rc3
v2.6.34-rc4
v2.6.34-rc5
v2.6.34-rc6
v2.6.34-rc7
v2.6.35
v2.6.35-rc1
v2.6.35-rc2
v2.6.35-rc3
v2.6.35-rc4
v2.6.35-rc5
v2.6.35-rc6
v2.6.36
v2.6.36-rc1
v2.6.36-rc2
v2.6.36-rc3
v2.6.36-rc4
v2.6.36-rc5
v2.6.36-rc6
v2.6.36-rc7
v2.6.36-rc8
v2.6.37
v2.6.37-rc1
v2.6.37-rc2
v2.6.37-rc3
v2.6.37-rc4
v2.6.37-rc5
v2.6.37-rc6
v2.6.37-rc7
v2.6.37-rc8
v2.6.38
v2.6.38-rc1
v2.6.38-rc2
v2.6.38-rc3
v2.6.38-rc4
v2.6.38-rc5
v2.6.38-rc6
v2.6.38-rc7
v2.6.38-rc8
v2.6.39
v2.6.39-rc1
v2.6.39-rc2
v2.6.39-rc3
v2.6.39-rc4
v2.6.39-rc5
v2.6.39-rc6
v2.6.39-rc7
v3.*
v3.0
v3.0-rc1
v3.0-rc2
v3.0-rc3
v3.0-rc4
v3.0-rc5
v3.0-rc6
v3.0-rc7
v3.1
v3.1-rc1
v3.1-rc10
v3.1-rc2
v3.1-rc3
v3.1-rc4
v3.1-rc5
v3.1-rc6
v3.1-rc7
v3.1-rc8
v3.1-rc9
v3.10
v3.10-rc1
v3.10-rc2
v3.10-rc3
v3.10-rc4
v3.10-rc5
v3.10-rc6
v3.10-rc7
v3.11
v3.11-rc1
v3.11-rc2
v3.11-rc3
v3.11-rc4
v3.11-rc5
v3.11-rc6
v3.11-rc7
v3.12
v3.12-rc1
v3.12-rc2
v3.12-rc3
v3.12-rc4
v3.12-rc5
v3.12-rc6
v3.12-rc7
v3.13
v3.13-rc1
v3.13-rc2
v3.13-rc3
v3.13-rc4
v3.13-rc5
v3.13-rc6
v3.13-rc7
v3.13-rc8
v3.14
v3.14-rc1
v3.14-rc2
v3.14-rc3
v3.14-rc4
v3.14-rc5
v3.14-rc6
v3.14-rc7
v3.14-rc8
v3.15
v3.15-rc1
v3.15-rc2
v3.15-rc3
v3.15-rc4
v3.15-rc5
v3.15-rc6
v3.15-rc7
v3.15-rc8
v3.16
v3.16-rc1
v3.16-rc2
v3.16-rc3
v3.16-rc4
v3.16-rc5
v3.16-rc6
v3.16-rc7
v3.17
v3.17-rc1
v3.17-rc2
v3.17-rc3
v3.17-rc4
v3.17-rc5
v3.17-rc6
v3.17-rc7
v3.18
v3.18-rc1
v3.18-rc2
v3.18-rc3
v3.18-rc4
v3.18-rc5
v3.18-rc6
v3.18-rc7
v3.19
v3.19-rc1
v3.19-rc2
v3.19-rc3
v3.19-rc4
v3.19-rc5
v3.19-rc6
v3.19-rc7
v3.2
v3.2-rc1
v3.2-rc2
v3.2-rc3
v3.2-rc4
v3.2-rc5
v3.2-rc6
v3.2-rc7
v3.3
v3.3-rc1
v3.3-rc2
v3.3-rc3
v3.3-rc4
v3.3-rc5
v3.3-rc6
v3.3-rc7
v3.4
v3.4-rc1
v3.4-rc2
v3.4-rc3
v3.4-rc4
v3.4-rc5
v3.4-rc6
v3.4-rc7
v3.5
v3.5-rc1
v3.5-rc2
v3.5-rc3
v3.5-rc4
v3.5-rc5
v3.5-rc6
v3.5-rc7
v3.6
v3.6-rc1
v3.6-rc2
v3.6-rc3
v3.6-rc4
v3.6-rc5
v3.6-rc6
v3.6-rc7
v3.7
v3.7-rc1
v3.7-rc2
v3.7-rc3
v3.7-rc4
v3.7-rc5
v3.7-rc6
v3.7-rc7
v3.7-rc8
v3.8
v3.8-rc1
v3.8-rc2
v3.8-rc3
v3.8-rc4
v3.8-rc5
v3.8-rc6
v3.8-rc7
v3.9
v3.9-rc1
v3.9-rc2
v3.9-rc3
v3.9-rc4
v3.9-rc5
v3.9-rc6
v3.9-rc7
v3.9-rc8
v4.*
v4.0
v4.0-rc1
v4.0-rc2
v4.0-rc3
v4.0-rc4
v4.0-rc5
v4.0-rc6
v4.0-rc7
v4.1
v4.1-rc1
v4.1-rc2
v4.1-rc3
v4.1-rc4
v4.1-rc5
v4.1-rc6
v4.1-rc7
v4.1-rc8
v4.10
v4.10-rc1
v4.10-rc2
v4.10-rc3
v4.10-rc4
v4.10-rc5
v4.10-rc6
v4.10-rc7
v4.10-rc8
v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.2
v4.2-rc1
v4.2-rc2
v4.2-rc3
v4.2-rc4
v4.2-rc5
v4.2-rc6
v4.2-rc7
v4.2-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7
v4.3
v4.3-rc1
v4.3-rc2
v4.3-rc3
v4.3-rc4
v4.3-rc5
v4.3-rc6
v4.3-rc7
v4.4
v4.4-rc1
v4.4-rc2
v4.4-rc3
v4.4-rc4
v4.4-rc5
v4.4-rc6
v4.4-rc7
v4.4-rc8
v4.5
v4.5-rc1
v4.5-rc2
v4.5-rc3
v4.5-rc4
v4.5-rc5
v4.5-rc6
v4.5-rc7
v4.6
v4.6-rc1
v4.6-rc2
v4.6-rc3
v4.6-rc4
v4.6-rc5
v4.6-rc6
v4.6-rc7
v4.7
v4.7-rc1
v4.7-rc2
v4.7-rc3
v4.7-rc4
v4.7-rc5
v4.7-rc6
v4.7-rc7
v4.8
v4.8-rc1
v4.8-rc2
v4.8-rc3
v4.8-rc4
v4.8-rc5
v4.8-rc6
v4.8-rc7
v4.8-rc8
v4.9
v4.9-rc1
v4.9-rc2
v4.9-rc3
v4.9-rc4
v4.9-rc5
v4.9-rc6
v4.9-rc7
v4.9-rc8
v5.*
v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0171.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "15199540451333704430777446949921479392",
                "206074752473584928484102081340273198996",
                "39704337016543370349204010323479970111"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-1845ce7d",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "include/linux/kvm_host.h"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 1356.0,
            "function_hash": "158190933365547608574921644602856501487"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-2509e95e",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "__kvm_handle_hva_range",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 360.0,
            "function_hash": "16237603286124941095645960248271882677"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-2ba47c3a",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_handle_hva_range_no_flush",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 322.0,
            "function_hash": "43011373165311799113436629228420780295"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-34e0db07",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_invalidate_memslot",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 366.0,
            "function_hash": "119143224439569798955320101503427236012"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-3b432e8c",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_handle_hva_range",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "15540786275734369818809499608323874562",
                "254837315489122845961377165640345479014",
                "123646732924358920308086190087990000680"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-444ac441",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/kvm/x86.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "305852333275854504119806924667401248884",
                "7506193366465972989349830475099666812",
                "153861404118147357794028216243407344122",
                "26776498238893859229860241949771578893"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-51688423",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/include/asm/kvm_host.h"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "268443529006950722396775080245188613779",
                "128524641173682946541561914966651214917",
                "216450444427564838861515400508890998756",
                "234794149397946083752564254314901610820"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-5ea627bb",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/include/asm/kvm-x86-ops.h"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "310598060473066981747316574004103281406",
                "111595969626595553127014028464379598517",
                "155323017909936154752557852676134207667"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-60d53218",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/kvm/svm/sev.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "35938259323167039592624598782276423137",
                "324076311166542082123468860727168801059",
                "227915937241988851991156719081374289498",
                "3104203267809734728757898257340088412"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-8bb8a7f5",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/kvm/svm/svm.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 1175.0,
            "function_hash": "2182912413528092728782717711279679960"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-8d9c2488",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_destroy_vm",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 620.0,
            "function_hash": "339731251359130401584649688636320950390"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-98d81f1a",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_mmu_notifier_invalidate_range_end",
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "1119345639169899909086823047190667773",
                "188879511551743290668619595818629966782",
                "206363391053280347620291093888882204203",
                "240885564631735795683681736856947196883",
                "66074218263701953897839536871928566576",
                "258015961366394169493837861321160531219",
                "110869957718741220445304514661297216444",
                "163729669501040892350861317218406291686",
                "258178002720104290915337873418989379517",
                "145463107596097367341627070374833355429",
                "12724348326987714602810672693658241737",
                "192394775791232023923822855514653559737",
                "267602529222721269507157701603843869988",
                "26834184330953235944647156678544525479",
                "60148439268069501227376692576959783324",
                "261869920597276786557733676465224704579",
                "127836033255487762168082820693216968247",
                "335394831717083556906362278928690763391",
                "25371648144956366929776761079838692630",
                "93749341626112418425085678648549936858",
                "102766117013721383716765491525977615322",
                "20354372043975537541095383821761319264",
                "269788399233472522275767691803872056740",
                "192316178091491079031037706185772130638",
                "216001223119277004289129628322116354205",
                "329328553804526062646579561969374644893",
                "1440732861859713764774794512981684241",
                "221031513547291882290525916238522048426",
                "289409303470612211934291628324337741004",
                "28659187750025315917561757720042845173",
                "279765917203983050535776853515159874857",
                "261559608558857308252799179207653339971",
                "339317431050719737815855050748546169420",
                "676563687478590577775318453812161177",
                "216553263736800575389774030882985408504",
                "131311855863495389254085115097251799313",
                "334107145204863522470533043900976678382",
                "53995933746558389236441401054490480860",
                "211694273059051519476909522212618153322",
                "307968468427778008348796437673148573690",
                "139741308169535278108961424893792270168",
                "33804212148095849534479664222817420638",
                "65594613626525767914653621483505929304",
                "284120058080198106106263826935533199378",
                "213871271302217430696402292706664493961",
                "132162814824148285387554167824369295126",
                "34196994162791092555636814027777403166",
                "365795073030360640631103843161793900"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-b139eb99",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "virt/kvm/kvm_main.c"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "17284586719728757590268676273070649259",
                "282012499313601028116059209544001118128",
                "17174299876944126225434323698893465658",
                "96260348987609765868220732290637745805"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2022-0171-fbe7d349",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "file": "arch/x86/kvm/svm/svm.h"
        }
    },
    {
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 606.0,
            "function_hash": "179466569172207331242238152479520957477"
        },
        "signature_type": "Function",
        "id": "CVE-2022-0171-ff907942",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@683412ccf61294d727ead4a73d97397396e69a6b",
        "target": {
            "function": "kvm_mmu_notifier_invalidate_range_start",
            "file": "virt/kvm/kvm_main.c"
        }
    }
]