{"id":"CVE-2022-0171","details":"A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).","modified":"2026-05-08T04:48:10.899056Z","published":"2022-08-26T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0171.json","cwe_ids":["CWE-459"],"cna_assigner":"redhat"},"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2022-0171"},{"type":"WEB","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=683412ccf61294d727ead4a73d97397396e69a6b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0171.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0171"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038940"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"last_affected":"af2d861d4cd2a4da5137f795ee3509e6f944a25b"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"Fixed in kernel 5.18-rc4"}],"source":"AFFECTED_FIELD"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0171.json"}}],"schema_version":"1.7.5"}