In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Forcibly leave nested virt when SMM state is toggled
Forcibly leave nested virtualization operation if userspace toggles SMM state via KVMSETVCPUEVENTS or KVMSYNCX86EVENTS. If userspace forces the vCPU out of SMM while it's post-VMXON and then injects an SMI, vmxentersmm() will overwrite vmx->nested.smm.vmxon and end up with both vmxon=false and smm.vmxon=false, but all other nVMX state allocated.
Don't attempt to gracefully handle the transition as (a) most transitions are nonsencial, e.g. forcing SMM while L2 is running, (b) there isn't sufficient information to handle all transitions, e.g. SVM wants access to the SMRAM save state, and (c) KVMSETVCPUEVENTS must precede KVMSETNESTEDSTATE during state restore as the latter disallows putting the vCPU into L2 if SMM is active, and disallows tagging the vCPU as being post-VMXON in SMM if SMM is not active.
Abuse of KVMSETVCPU_EVENTS manifests as a WARN and memory leak in nVMX due to failure to free vmcs01's shadow VMCS, but the bug goes far beyond just a memory leak, e.g. toggling SMM on while L2 is active puts the vCPU in an architecturally impossible state.
WARNING: CPU: 0 PID: 3606 at freeloadedvmcs arch/x86/kvm/vmx/vmx.c:2665 [inline] WARNING: CPU: 0 PID: 3606 at freeloadedvmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656 Modules linked in: CPU: 1 PID: 3606 Comm: syz-executor725 Not tainted 5.17.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:freeloadedvmcs arch/x86/kvm/vmx/vmx.c:2665 [inline] RIP: 0010:freeloadedvmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656 Code: <0f> 0b eb b3 e8 8f 4d 9f 00 e9 f7 fe ff ff 48 89 df e8 92 4d 9f 00 Call Trace: <TASK> kvmarchvcpudestroy+0x72/0x2f0 arch/x86/kvm/x86.c:11123 kvmvcpudestroy arch/x86/kvm/../../../virt/kvm/kvmmain.c:441 [inline] kvmdestroyvcpus+0x11f/0x290 arch/x86/kvm/../../../virt/kvm/kvmmain.c:460 kvmfreevcpus arch/x86/kvm/x86.c:11564 [inline] kvmarchdestroyvm+0x2e8/0x470 arch/x86/kvm/x86.c:11676 kvmdestroyvm arch/x86/kvm/../../../virt/kvm/kvmmain.c:1217 [inline] kvmputkvm+0x4fa/0xb00 arch/x86/kvm/../../../virt/kvm/kvmmain.c:1250 kvmvmrelease+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvmmain.c:1273 _fput+0x286/0x9f0 fs/filetable.c:311 taskworkrun+0xdd/0x1a0 kernel/taskwork.c:164 exittaskwork include/linux/taskwork.h:32 [inline] doexit+0xb29/0x2a30 kernel/exit.c:806 dogroupexit+0xd2/0x2f0 kernel/exit.c:935 getsignal+0x4b0/0x28c0 kernel/signal.c:2862 archdosignalorrestart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handlesignalwork kernel/entry/common.c:148 [inline] exittousermodeloop kernel/entry/common.c:172 [inline] exittousermodeprepare+0x17d/0x290 kernel/entry/common.c:207 _syscallexittousermodework kernel/entry/common.c:289 [inline] syscallexittousermode+0x19/0x60 kernel/entry/common.c:300 dosyscall64+0x42/0xb0 arch/x86/entry/common.c:86 entrySYSCALL64after_hwframe+0x44/0xae </TASK>
[
{
"id": "CVE-2022-48763-06b820e5",
"target": {
"file": "arch/x86/kvm/svm/svm.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"85323468085550199863831504000647541895",
"230281674316366133128977916760009635375",
"10067763172749214192864985116013132034",
"300367248344173299895356289677388874490"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-13d51c2c",
"target": {
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"145424087647072447295578924515055237732",
"212861015595090059888702603028143030443",
"106255069828928634918486893244613440775",
"111149167285740103605773933973203282457",
"237663590640779596764540056731943511573"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-18f9b947",
"target": {
"file": "arch/x86/include/asm/kvm_host.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"328149507135207832172587766802514157847",
"113126385481386319849859078372105019231",
"198666797944271998685029907306990918226",
"279319078227510362424723188316235045565"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-1e4fc783",
"target": {
"file": "arch/x86/kvm/vmx/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"326628500284517124998542780900686845464",
"86489569584777144056432353325827033364",
"37533558775276368953621451247066076140",
"13380955716207782175499035716175046226"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-27874eb9",
"target": {
"function": "svm_set_nested_state",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"length": 2462.0,
"function_hash": "48144328463197674434153036829765593789"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-3f654f35",
"target": {
"function": "svm_set_efer",
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"length": 784.0,
"function_hash": "151381315844051460496657867803291491097"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-406dd63a",
"target": {
"function": "kvm_vcpu_ioctl_x86_set_vcpu_events",
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"length": 2814.0,
"function_hash": "73061840048499336130815845303692239304"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-46a68913",
"target": {
"function": "kvm_vcpu_ioctl_x86_set_vcpu_events",
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"length": 2895.0,
"function_hash": "16603446398470054539959898147482350968"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-51c18658",
"target": {
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"328323365669363852889704575091002795898",
"139085668243042125228429101388820398214",
"119776995939265820597864575783279800178",
"164042697931222042383506159820071541223"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-5694d527",
"target": {
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"328323365669363852889704575091002795898",
"139085668243042125228429101388820398214",
"75129261567258842554691563040554680196",
"307422844129587811021604384561937885836"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-5c6763ac",
"target": {
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"154386050728662053902123941153566364075",
"180764384763893518548957360782749410928",
"38542007763158968446216845671578473428",
"217135526945867443747502811186368898230",
"235715590567929101434586371554715962668",
"15352751625403626202939340907024113286",
"234650308180711379285221831633707710570",
"80003930886952132235101353234728153591",
"268633176415979773696590634692192697822",
"121329059499795300194746111979842118291",
"74924918588796393856662804156460158627",
"208543020898743541049577450539422181410",
"137813420213298484206598437084668159152",
"288266133976343867631143488415063456409",
"299470344422827992832411816473421014912",
"89631894016906409177822472384496549627",
"2445548498613702910351384001760308618",
"117109343909031597964666379389478447731"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-5d5872a4",
"target": {
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"154386050728662053902123941153566364075",
"180764384763893518548957360782749410928",
"38542007763158968446216845671578473428",
"217135526945867443747502811186368898230",
"235715590567929101434586371554715962668",
"15352751625403626202939340907024113286",
"234650308180711379285221831633707710570",
"80003930886952132235101353234728153591",
"268633176415979773696590634692192697822",
"121329059499795300194746111979842118291",
"74924918588796393856662804156460158627",
"208543020898743541049577450539422181410",
"137813420213298484206598437084668159152",
"288266133976343867631143488415063456409",
"299470344422827992832411816473421014912",
"89631894016906409177822472384496549627",
"2445548498613702910351384001760308618",
"117109343909031597964666379389478447731"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-6df141e8",
"target": {
"function": "svm_set_efer",
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"length": 784.0,
"function_hash": "151381315844051460496657867803291491097"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-73b0d5d1",
"target": {
"function": "svm_set_nested_state",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"length": 1996.0,
"function_hash": "246540946946421064250702066936107493985"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-7b1d61f5",
"target": {
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"154386050728662053902123941153566364075",
"180764384763893518548957360782749410928",
"38542007763158968446216845671578473428",
"217135526945867443747502811186368898230",
"235715590567929101434586371554715962668",
"15352751625403626202939340907024113286",
"234650308180711379285221831633707710570",
"80003930886952132235101353234728153591",
"268633176415979773696590634692192697822",
"121329059499795300194746111979842118291",
"74924918588796393856662804156460158627",
"208543020898743541049577450539422181410",
"137813420213298484206598437084668159152",
"288266133976343867631143488415063456409",
"299470344422827992832411816473421014912",
"89631894016906409177822472384496549627",
"2445548498613702910351384001760308618",
"117109343909031597964666379389478447731"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-84ee2dbc",
"target": {
"function": "svm_leave_nested",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"length": 343.0,
"function_hash": "305602246540717242352187948939730551281"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-86487f65",
"target": {
"file": "arch/x86/kvm/svm/svm.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"85323468085550199863831504000647541895",
"230281674316366133128977916760009635375",
"10067763172749214192864985116013132034",
"300367248344173299895356289677388874490"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-95fa61fe",
"target": {
"file": "arch/x86/kvm/vmx/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"326628500284517124998542780900686845464",
"86489569584777144056432353325827033364",
"37533558775276368953621451247066076140",
"13380955716207782175499035716175046226"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-9614dc96",
"target": {
"function": "svm_leave_nested",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"length": 343.0,
"function_hash": "305602246540717242352187948939730551281"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-987f1829",
"target": {
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"145424087647072447295578924515055237732",
"212861015595090059888702603028143030443",
"106255069828928634918486893244613440775",
"111149167285740103605773933973203282457",
"237663590640779596764540056731943511573"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-a1a90b1e",
"target": {
"file": "arch/x86/include/asm/kvm_host.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"328149507135207832172587766802514157847",
"113126385481386319849859078372105019231",
"198666797944271998685029907306990918226",
"279319078227510362424723188316235045565"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-a9c6e8ec",
"target": {
"file": "arch/x86/include/asm/kvm_host.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"1947519569253253399828274106969024406",
"48784874120328273772469408922267601919",
"198666797944271998685029907306990918226",
"81525626415954616918389478939943634518"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-aa3f8bce",
"target": {
"file": "arch/x86/kvm/svm/svm.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"327354553647709735138190134396560262607",
"88734897825084080018769672115827191190",
"171664442649464350718606524613330974315",
"2653721381828000636572628667270949442"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-ac8759d6",
"target": {
"function": "svm_leave_nested",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"length": 343.0,
"function_hash": "305602246540717242352187948939730551281"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-ad404490",
"target": {
"function": "svm_set_efer",
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"length": 784.0,
"function_hash": "151381315844051460496657867803291491097"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-be90cc16",
"target": {
"file": "arch/x86/kvm/svm/svm.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"85323468085550199863831504000647541895",
"230281674316366133128977916760009635375",
"10067763172749214192864985116013132034",
"300367248344173299895356289677388874490"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-bfd41458",
"target": {
"function": "kvm_vcpu_ioctl_x86_set_vcpu_events",
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"length": 2814.0,
"function_hash": "73061840048499336130815845303692239304"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-c2905f67",
"target": {
"function": "svm_set_nested_state",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"length": 2544.0,
"function_hash": "272930248052257082632013604817912283172"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-c356d947",
"target": {
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"line_hashes": [
"328323365669363852889704575091002795898",
"139085668243042125228429101388820398214",
"75129261567258842554691563040554680196",
"307422844129587811021604384561937885836"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-cdcbcf6f",
"target": {
"function": "svm_set_nested_state",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"length": 2462.0,
"function_hash": "48144328463197674434153036829765593789"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-d0947929",
"target": {
"file": "arch/x86/kvm/vmx/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4c0d89c92e957ecccce12e66b63875d0cc7af7e",
"deprecated": false,
"digest": {
"line_hashes": [
"326628500284517124998542780900686845464",
"86489569584777144056432353325827033364",
"37533558775276368953621451247066076140",
"13380955716207782175499035716175046226"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-d1f1d3f0",
"target": {
"function": "kvm_vcpu_ioctl_x86_set_vcpu_events",
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7e570780efc5cec9b2ed1e0472a7da14e864fdb",
"deprecated": false,
"digest": {
"length": 2814.0,
"function_hash": "73061840048499336130815845303692239304"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-e6c71ff5",
"target": {
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"328323365669363852889704575091002795898",
"139085668243042125228429101388820398214",
"75129261567258842554691563040554680196",
"307422844129587811021604384561937885836"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-e90b2275",
"target": {
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"329980694966615671452742810183745178086",
"31696324848621397148156711311255156952",
"138812326109368914815433752949493800492",
"283635285683676678380881762632258566634"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-ee0130c2",
"target": {
"file": "arch/x86/include/asm/kvm_host.h"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"328149507135207832172587766802514157847",
"113126385481386319849859078372105019231",
"198666797944271998685029907306990918226",
"279319078227510362424723188316235045565"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-f325731a",
"target": {
"file": "arch/x86/kvm/vmx/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"326628500284517124998542780900686845464",
"86489569584777144056432353325827033364",
"37533558775276368953621451247066076140",
"72906011851103746719405929469170154400"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-f3a078df",
"target": {
"function": "svm_set_efer",
"file": "arch/x86/kvm/svm/svm.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"length": 636.0,
"function_hash": "231821038776924843738576591400675951134"
},
"signature_type": "Function"
},
{
"id": "CVE-2022-48763-f3bf8b39",
"target": {
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"line_hashes": [
"263366921107873028458618449502063694745",
"180764384763893518548957360782749410928",
"311086546649632328371155178235394472420",
"290014606180243692606632810154991795952",
"176933867097731415511691603172600738619",
"234650308180711379285221831633707710570",
"80003930886952132235101353234728153591",
"268633176415979773696590634692192697822",
"121329059499795300194746111979842118291",
"239221737402485684161922374775018878115",
"101801021418651698688879780230661363176",
"161532503919085588959621344145045535053",
"57934587061020460407878987594507088620",
"100729887053866033290871609742186036048",
"323464076272675278228701900874933744233",
"287570126565460666698362805221174756259"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-f4c7dd88",
"target": {
"file": "arch/x86/kvm/x86.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e302786233e6bc512986d007c96458ccf5ca21c7",
"deprecated": false,
"digest": {
"line_hashes": [
"145424087647072447295578924515055237732",
"212861015595090059888702603028143030443",
"106255069828928634918486893244613440775",
"111149167285740103605773933973203282457",
"237663590640779596764540056731943511573"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2022-48763-f9e01834",
"target": {
"function": "svm_leave_nested",
"file": "arch/x86/kvm/svm/nested.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080dbe7e9b86a0392d8dffc00d9971792afc121f",
"deprecated": false,
"digest": {
"length": 363.0,
"function_hash": "65932380389087352585409624519384551374"
},
"signature_type": "Function"
}
]