In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Forcibly leave nested virt when SMM state is toggled
Forcibly leave nested virtualization operation if userspace toggles SMM state via KVMSETVCPUEVENTS or KVMSYNCX86EVENTS. If userspace forces the vCPU out of SMM while it's post-VMXON and then injects an SMI, vmxentersmm() will overwrite vmx->nested.smm.vmxon and end up with both vmxon=false and smm.vmxon=false, but all other nVMX state allocated.
Don't attempt to gracefully handle the transition as (a) most transitions are nonsencial, e.g. forcing SMM while L2 is running, (b) there isn't sufficient information to handle all transitions, e.g. SVM wants access to the SMRAM save state, and (c) KVMSETVCPUEVENTS must precede KVMSETNESTEDSTATE during state restore as the latter disallows putting the vCPU into L2 if SMM is active, and disallows tagging the vCPU as being post-VMXON in SMM if SMM is not active.
Abuse of KVMSETVCPU_EVENTS manifests as a WARN and memory leak in nVMX due to failure to free vmcs01's shadow VMCS, but the bug goes far beyond just a memory leak, e.g. toggling SMM on while L2 is active puts the vCPU in an architecturally impossible state.
WARNING: CPU: 0 PID: 3606 at freeloadedvmcs arch/x86/kvm/vmx/vmx.c:2665 [inline] WARNING: CPU: 0 PID: 3606 at freeloadedvmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656 Modules linked in: CPU: 1 PID: 3606 Comm: syz-executor725 Not tainted 5.17.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:freeloadedvmcs arch/x86/kvm/vmx/vmx.c:2665 [inline] RIP: 0010:freeloadedvmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656 Code: <0f> 0b eb b3 e8 8f 4d 9f 00 e9 f7 fe ff ff 48 89 df e8 92 4d 9f 00 Call Trace: <TASK> kvmarchvcpudestroy+0x72/0x2f0 arch/x86/kvm/x86.c:11123 kvmvcpudestroy arch/x86/kvm/../../../virt/kvm/kvmmain.c:441 [inline] kvmdestroyvcpus+0x11f/0x290 arch/x86/kvm/../../../virt/kvm/kvmmain.c:460 kvmfreevcpus arch/x86/kvm/x86.c:11564 [inline] kvmarchdestroyvm+0x2e8/0x470 arch/x86/kvm/x86.c:11676 kvmdestroyvm arch/x86/kvm/../../../virt/kvm/kvmmain.c:1217 [inline] kvmputkvm+0x4fa/0xb00 arch/x86/kvm/../../../virt/kvm/kvmmain.c:1250 kvmvmrelease+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvmmain.c:1273 _fput+0x286/0x9f0 fs/filetable.c:311 taskworkrun+0xdd/0x1a0 kernel/taskwork.c:164 exittaskwork include/linux/taskwork.h:32 [inline] doexit+0xb29/0x2a30 kernel/exit.c:806 dogroupexit+0xd2/0x2f0 kernel/exit.c:935 getsignal+0x4b0/0x28c0 kernel/signal.c:2862 archdosignalorrestart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handlesignalwork kernel/entry/common.c:148 [inline] exittousermodeloop kernel/entry/common.c:172 [inline] exittousermodeprepare+0x17d/0x290 kernel/entry/common.c:207 _syscallexittousermodework kernel/entry/common.c:289 [inline] syscallexittousermode+0x19/0x60 kernel/entry/common.c:300 dosyscall64+0x42/0xb0 arch/x86/entry/common.c:86 entrySYSCALL64after_hwframe+0x44/0xae </TASK>
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.h" }, "id": "CVE-2022-48763-06b820e5", "digest": { "line_hashes": [ "85323468085550199863831504000647541895", "230281674316366133128977916760009635375", "10067763172749214192864985116013132034", "300367248344173299895356289677388874490" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/x86.c" }, "id": "CVE-2022-48763-13d51c2c", "digest": { "line_hashes": [ "145424087647072447295578924515055237732", "212861015595090059888702603028143030443", "106255069828928634918486893244613440775", "111149167285740103605773933973203282457", "237663590640779596764540056731943511573" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/include/asm/kvm_host.h" }, "id": "CVE-2022-48763-18f9b947", "digest": { "line_hashes": [ "328149507135207832172587766802514157847", "113126385481386319849859078372105019231", "198666797944271998685029907306990918226", "279319078227510362424723188316235045565" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/vmx/nested.c" }, "id": "CVE-2022-48763-1e4fc783", "digest": { "line_hashes": [ "326628500284517124998542780900686845464", "86489569584777144056432353325827033364", "37533558775276368953621451247066076140", "13380955716207782175499035716175046226" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_set_nested_state" }, "id": "CVE-2022-48763-27874eb9", "digest": { "length": 2462.0, "function_hash": "48144328463197674434153036829765593789" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/svm.c", "function": "svm_set_efer" }, "id": "CVE-2022-48763-3f654f35", "digest": { "length": 784.0, "function_hash": "151381315844051460496657867803291491097" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/x86.c", "function": "kvm_vcpu_ioctl_x86_set_vcpu_events" }, "id": "CVE-2022-48763-406dd63a", "digest": { "length": 2814.0, "function_hash": "73061840048499336130815845303692239304" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/x86.c", "function": "kvm_vcpu_ioctl_x86_set_vcpu_events" }, "id": "CVE-2022-48763-46a68913", "digest": { "length": 2895.0, "function_hash": "16603446398470054539959898147482350968" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.c" }, "id": "CVE-2022-48763-51c18658", "digest": { "line_hashes": [ "328323365669363852889704575091002795898", "139085668243042125228429101388820398214", "119776995939265820597864575783279800178", "164042697931222042383506159820071541223" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.c" }, "id": "CVE-2022-48763-5694d527", "digest": { "line_hashes": [ "328323365669363852889704575091002795898", "139085668243042125228429101388820398214", "75129261567258842554691563040554680196", "307422844129587811021604384561937885836" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/nested.c" }, "id": "CVE-2022-48763-5c6763ac", "digest": { "line_hashes": [ "154386050728662053902123941153566364075", "180764384763893518548957360782749410928", "38542007763158968446216845671578473428", "217135526945867443747502811186368898230", "235715590567929101434586371554715962668", "15352751625403626202939340907024113286", "234650308180711379285221831633707710570", "80003930886952132235101353234728153591", "268633176415979773696590634692192697822", "121329059499795300194746111979842118291", "74924918588796393856662804156460158627", "208543020898743541049577450539422181410", "137813420213298484206598437084668159152", "288266133976343867631143488415063456409", "299470344422827992832411816473421014912", "89631894016906409177822472384496549627", "2445548498613702910351384001760308618", "117109343909031597964666379389478447731" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/nested.c" }, "id": "CVE-2022-48763-5d5872a4", "digest": { "line_hashes": [ "154386050728662053902123941153566364075", "180764384763893518548957360782749410928", "38542007763158968446216845671578473428", "217135526945867443747502811186368898230", "235715590567929101434586371554715962668", "15352751625403626202939340907024113286", "234650308180711379285221831633707710570", "80003930886952132235101353234728153591", "268633176415979773696590634692192697822", "121329059499795300194746111979842118291", "74924918588796393856662804156460158627", "208543020898743541049577450539422181410", "137813420213298484206598437084668159152", "288266133976343867631143488415063456409", "299470344422827992832411816473421014912", "89631894016906409177822472384496549627", "2445548498613702910351384001760308618", "117109343909031597964666379389478447731" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/svm.c", "function": "svm_set_efer" }, "id": "CVE-2022-48763-6df141e8", "digest": { "length": 784.0, "function_hash": "151381315844051460496657867803291491097" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_set_nested_state" }, "id": "CVE-2022-48763-73b0d5d1", "digest": { "length": 1996.0, "function_hash": "246540946946421064250702066936107493985" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/nested.c" }, "id": "CVE-2022-48763-7b1d61f5", "digest": { "line_hashes": [ "154386050728662053902123941153566364075", "180764384763893518548957360782749410928", "38542007763158968446216845671578473428", "217135526945867443747502811186368898230", "235715590567929101434586371554715962668", "15352751625403626202939340907024113286", "234650308180711379285221831633707710570", "80003930886952132235101353234728153591", "268633176415979773696590634692192697822", "121329059499795300194746111979842118291", "74924918588796393856662804156460158627", "208543020898743541049577450539422181410", "137813420213298484206598437084668159152", "288266133976343867631143488415063456409", "299470344422827992832411816473421014912", "89631894016906409177822472384496549627", "2445548498613702910351384001760308618", "117109343909031597964666379389478447731" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_leave_nested" }, "id": "CVE-2022-48763-84ee2dbc", "digest": { "length": 343.0, "function_hash": "305602246540717242352187948939730551281" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.h" }, "id": "CVE-2022-48763-86487f65", "digest": { "line_hashes": [ "85323468085550199863831504000647541895", "230281674316366133128977916760009635375", "10067763172749214192864985116013132034", "300367248344173299895356289677388874490" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/vmx/nested.c" }, "id": "CVE-2022-48763-95fa61fe", "digest": { "line_hashes": [ "326628500284517124998542780900686845464", "86489569584777144056432353325827033364", "37533558775276368953621451247066076140", "13380955716207782175499035716175046226" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_leave_nested" }, "id": "CVE-2022-48763-9614dc96", "digest": { "length": 343.0, "function_hash": "305602246540717242352187948939730551281" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/x86.c" }, "id": "CVE-2022-48763-987f1829", "digest": { "line_hashes": [ "145424087647072447295578924515055237732", "212861015595090059888702603028143030443", "106255069828928634918486893244613440775", "111149167285740103605773933973203282457", "237663590640779596764540056731943511573" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/include/asm/kvm_host.h" }, "id": "CVE-2022-48763-a1a90b1e", "digest": { "line_hashes": [ "328149507135207832172587766802514157847", "113126385481386319849859078372105019231", "198666797944271998685029907306990918226", "279319078227510362424723188316235045565" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/include/asm/kvm_host.h" }, "id": "CVE-2022-48763-a9c6e8ec", "digest": { "line_hashes": [ "1947519569253253399828274106969024406", "48784874120328273772469408922267601919", "198666797944271998685029907306990918226", "81525626415954616918389478939943634518" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.h" }, "id": "CVE-2022-48763-aa3f8bce", "digest": { "line_hashes": [ "327354553647709735138190134396560262607", "88734897825084080018769672115827191190", "171664442649464350718606524613330974315", "2653721381828000636572628667270949442" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_leave_nested" }, "id": "CVE-2022-48763-ac8759d6", "digest": { "length": 343.0, "function_hash": "305602246540717242352187948939730551281" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/svm.c", "function": "svm_set_efer" }, "id": "CVE-2022-48763-ad404490", "digest": { "length": 784.0, "function_hash": "151381315844051460496657867803291491097" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.h" }, "id": "CVE-2022-48763-be90cc16", "digest": { "line_hashes": [ "85323468085550199863831504000647541895", "230281674316366133128977916760009635375", "10067763172749214192864985116013132034", "300367248344173299895356289677388874490" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/x86.c", "function": "kvm_vcpu_ioctl_x86_set_vcpu_events" }, "id": "CVE-2022-48763-bfd41458", "digest": { "length": 2814.0, "function_hash": "73061840048499336130815845303692239304" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_set_nested_state" }, "id": "CVE-2022-48763-c2905f67", "digest": { "length": 2544.0, "function_hash": "272930248052257082632013604817912283172" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.c" }, "id": "CVE-2022-48763-c356d947", "digest": { "line_hashes": [ "328323365669363852889704575091002795898", "139085668243042125228429101388820398214", "75129261567258842554691563040554680196", "307422844129587811021604384561937885836" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_set_nested_state" }, "id": "CVE-2022-48763-cdcbcf6f", "digest": { "length": 2462.0, "function_hash": "48144328463197674434153036829765593789" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/vmx/nested.c" }, "id": "CVE-2022-48763-d0947929", "digest": { "line_hashes": [ "326628500284517124998542780900686845464", "86489569584777144056432353325827033364", "37533558775276368953621451247066076140", "13380955716207782175499035716175046226" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/x86.c", "function": "kvm_vcpu_ioctl_x86_set_vcpu_events" }, "id": "CVE-2022-48763-d1f1d3f0", "digest": { "length": 2814.0, "function_hash": "73061840048499336130815845303692239304" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/svm.c" }, "id": "CVE-2022-48763-e6c71ff5", "digest": { "line_hashes": [ "328323365669363852889704575091002795898", "139085668243042125228429101388820398214", "75129261567258842554691563040554680196", "307422844129587811021604384561937885836" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/x86.c" }, "id": "CVE-2022-48763-e90b2275", "digest": { "line_hashes": [ "329980694966615671452742810183745178086", "31696324848621397148156711311255156952", "138812326109368914815433752949493800492", "283635285683676678380881762632258566634" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/include/asm/kvm_host.h" }, "id": "CVE-2022-48763-ee0130c2", "digest": { "line_hashes": [ "328149507135207832172587766802514157847", "113126385481386319849859078372105019231", "198666797944271998685029907306990918226", "279319078227510362424723188316235045565" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/vmx/nested.c" }, "id": "CVE-2022-48763-f325731a", "digest": { "line_hashes": [ "326628500284517124998542780900686845464", "86489569584777144056432353325827033364", "37533558775276368953621451247066076140", "72906011851103746719405929469170154400" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/svm.c", "function": "svm_set_efer" }, "id": "CVE-2022-48763-f3a078df", "digest": { "length": 636.0, "function_hash": "231821038776924843738576591400675951134" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/svm/nested.c" }, "id": "CVE-2022-48763-f3bf8b39", "digest": { "line_hashes": [ "263366921107873028458618449502063694745", "180764384763893518548957360782749410928", "311086546649632328371155178235394472420", "290014606180243692606632810154991795952", "176933867097731415511691603172600738619", "234650308180711379285221831633707710570", "80003930886952132235101353234728153591", "268633176415979773696590634692192697822", "121329059499795300194746111979842118291", "239221737402485684161922374775018878115", "101801021418651698688879780230661363176", "161532503919085588959621344145045535053", "57934587061020460407878987594507088620", "100729887053866033290871609742186036048", "323464076272675278228701900874933744233", "287570126565460666698362805221174756259" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/kvm/x86.c" }, "id": "CVE-2022-48763-f4c7dd88", "digest": { "line_hashes": [ "145424087647072447295578924515055237732", "212861015595090059888702603028143030443", "106255069828928634918486893244613440775", "111149167285740103605773933973203282457", "237663590640779596764540056731943511573" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/kvm/svm/nested.c", "function": "svm_leave_nested" }, "id": "CVE-2022-48763-f9e01834", "digest": { "length": 363.0, "function_hash": "65932380389087352585409624519384551374" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f" } ] }