CVE-2022-48764: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2} Free the "struct kvm_cpuid_entry2" array on successful post-KVM_RUN KVM_SET_CPUID{,2} to fix a memory leak, the callers of kvm_set_cpuid() free the array only on failure. BUG: memory leak unreferenced object 0xffff88810963a800 (size 2048): comm "syz-executor025", pid 3610, jiffies 4294944928 (age 8.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00 ................ 47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00 GenuntelineI.... backtrace: [<ffffffff814948ee>] kmalloc_node include/linux/slab.h:604 [inline] [<ffffffff814948ee>] kvmalloc_node+0x3e/0x100 mm/util.c:580 [<ffffffff814950f2>] kvmalloc include/linux/slab.h:732 [inline] [<ffffffff814950f2>] vmemdup_user+0x22/0x100 mm/util.c:199 [<ffffffff8109f5ff>] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423 [<ffffffff810711b9>] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251 [<ffffffff8103e92d>] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066 [<ffffffff815afacc>] vfs_ioctl fs/ioctl.c:51 [inline] [<ffffffff815afacc>] __do_sys_ioctl fs/ioctl.c:874 [inline] [<ffffffff815afacc>] __se_sys_ioctl fs/ioctl.c:860 [inline] [<ffffffff815afacc>] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [<ffffffff844a3335>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff844a3335>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI Analysis
Technical Summary
CVE-2022-48764 is a medium-severity vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the x86 architecture. The issue arises from improper memory management related to the handling of the kvm_cpuid_entry2 array during the execution of KVM_SET_CPUID and KVM_SET_CPUID2 ioctls. These ioctls are used to set the CPUID entries for virtual CPUs. The vulnerability manifests as a memory leak because the array is only freed on failure cases but not after successful KVM_RUN operations, leading to unreferenced memory objects accumulating over time. The technical details include a kernel backtrace showing the allocation and failure to free memory in functions such as kvmalloc_node, vmemdup_user, and kvm_vcpu_ioctl_set_cpuid2. The leak can be triggered by processes interacting with KVM ioctls, such as fuzzing tools (e.g., syz-executor), which repeatedly invoke these calls. While this vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system performance and stability, potentially leading to denial of service (DoS) conditions in environments heavily utilizing KVM virtualization. The CVSS v3.1 score is 5.3 (medium), reflecting local attack vector with low complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-48764 primarily concerns environments that rely heavily on Linux-based virtualization infrastructure, such as cloud service providers, data centers, and enterprises using KVM for virtual machine management. Memory leaks in kernel components can lead to resource exhaustion, causing degraded performance or crashes of host systems running multiple virtual machines. This can disrupt critical services, especially in sectors like finance, telecommunications, and government, where uptime and reliability are paramount. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting instability could be exploited as part of a broader attack chain or cause operational disruptions. Organizations with large-scale virtualization deployments or those running multi-tenant environments are at higher risk. Additionally, the requirement for local privileges to exploit the vulnerability means that attackers would need some level of access already, emphasizing the importance of internal security controls.
Mitigation Recommendations
To mitigate CVE-2022-48764, European organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available, ensuring that all KVM-related kernel components are updated. 2) Implement strict access controls and monitoring on systems running KVM to prevent unauthorized local access, including limiting who can interact with KVM ioctls. 3) Employ resource monitoring tools to detect unusual memory consumption patterns that may indicate exploitation attempts or memory leaks. 4) Use security-hardened configurations for virtualization hosts, such as SELinux or AppArmor policies, to restrict the capabilities of processes interacting with KVM. 5) Regularly audit and update virtualization management tools and fuzzing utilities to avoid triggering the vulnerability inadvertently. 6) Consider isolating critical virtual machines on separate hosts to minimize the impact of potential host instability. These measures go beyond generic advice by focusing on kernel patching, access restriction, and proactive resource monitoring tailored to KVM environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-48764: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2} Free the "struct kvm_cpuid_entry2" array on successful post-KVM_RUN KVM_SET_CPUID{,2} to fix a memory leak, the callers of kvm_set_cpuid() free the array only on failure. BUG: memory leak unreferenced object 0xffff88810963a800 (size 2048): comm "syz-executor025", pid 3610, jiffies 4294944928 (age 8.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00 ................ 47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00 GenuntelineI.... backtrace: [<ffffffff814948ee>] kmalloc_node include/linux/slab.h:604 [inline] [<ffffffff814948ee>] kvmalloc_node+0x3e/0x100 mm/util.c:580 [<ffffffff814950f2>] kvmalloc include/linux/slab.h:732 [inline] [<ffffffff814950f2>] vmemdup_user+0x22/0x100 mm/util.c:199 [<ffffffff8109f5ff>] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423 [<ffffffff810711b9>] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251 [<ffffffff8103e92d>] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066 [<ffffffff815afacc>] vfs_ioctl fs/ioctl.c:51 [inline] [<ffffffff815afacc>] __do_sys_ioctl fs/ioctl.c:874 [inline] [<ffffffff815afacc>] __se_sys_ioctl fs/ioctl.c:860 [inline] [<ffffffff815afacc>] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [<ffffffff844a3335>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff844a3335>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84600068>] entry_SYSCALL_64_after_hwframe+0x44/0xae
AI-Powered Analysis
Technical Analysis
CVE-2022-48764 is a medium-severity vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the x86 architecture. The issue arises from improper memory management related to the handling of the kvm_cpuid_entry2 array during the execution of KVM_SET_CPUID and KVM_SET_CPUID2 ioctls. These ioctls are used to set the CPUID entries for virtual CPUs. The vulnerability manifests as a memory leak because the array is only freed on failure cases but not after successful KVM_RUN operations, leading to unreferenced memory objects accumulating over time. The technical details include a kernel backtrace showing the allocation and failure to free memory in functions such as kvmalloc_node, vmemdup_user, and kvm_vcpu_ioctl_set_cpuid2. The leak can be triggered by processes interacting with KVM ioctls, such as fuzzing tools (e.g., syz-executor), which repeatedly invoke these calls. While this vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system performance and stability, potentially leading to denial of service (DoS) conditions in environments heavily utilizing KVM virtualization. The CVSS v3.1 score is 5.3 (medium), reflecting local attack vector with low complexity, requiring privileges but no user interaction, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-48764 primarily concerns environments that rely heavily on Linux-based virtualization infrastructure, such as cloud service providers, data centers, and enterprises using KVM for virtual machine management. Memory leaks in kernel components can lead to resource exhaustion, causing degraded performance or crashes of host systems running multiple virtual machines. This can disrupt critical services, especially in sectors like finance, telecommunications, and government, where uptime and reliability are paramount. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting instability could be exploited as part of a broader attack chain or cause operational disruptions. Organizations with large-scale virtualization deployments or those running multi-tenant environments are at higher risk. Additionally, the requirement for local privileges to exploit the vulnerability means that attackers would need some level of access already, emphasizing the importance of internal security controls.
Mitigation Recommendations
To mitigate CVE-2022-48764, European organizations should: 1) Apply the latest Linux kernel patches that address this memory leak as soon as they become available, ensuring that all KVM-related kernel components are updated. 2) Implement strict access controls and monitoring on systems running KVM to prevent unauthorized local access, including limiting who can interact with KVM ioctls. 3) Employ resource monitoring tools to detect unusual memory consumption patterns that may indicate exploitation attempts or memory leaks. 4) Use security-hardened configurations for virtualization hosts, such as SELinux or AppArmor policies, to restrict the capabilities of processes interacting with KVM. 5) Regularly audit and update virtualization management tools and fuzzing utilities to avoid triggering the vulnerability inadvertently. 6) Consider isolating critical virtual machines on separate hosts to minimize the impact of potential host instability. These measures go beyond generic advice by focusing on kernel patching, access restriction, and proactive resource monitoring tailored to KVM environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-20T11:09:39.060Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe60e2
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 8:55:24 PM
Last updated: 7/29/2025, 1:27:52 AM
Views: 11
Related Threats
CVE-2025-9039: CWE-277: Insecure Inherited Permissions, CWE-648: Incorrect Use of Privileged APIs in Amazon ECS
MediumCVE-2025-8967: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-54867: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki
HighCVE-2025-8966: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8965: Unrestricted Upload in linlinjava litemall
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.