CVE-2022-50224

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50224
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50224.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50224
Downstream
Published
2025-06-18T11:03:57.954Z
Modified
2025-11-28T02:34:17.231553Z
Summary
KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT

Treat the NX bit as valid when using NPT, as KVM will set the NX bit when the NX huge page mitigation is enabled (mindblowing) and trigger the WARN that fires on reserved SPTE bits being set.

KVM has required NX support for SVM since commit b26a71a1a5b9 ("KVM: SVM: Refuse to load kvm_amd if NX support is not available") for exactly this reason, but apparently it never occurred to anyone to actually test NPT with the mitigation enabled.

------------[ cut here ]------------ spte = 0x800000018a600ee7, level = 2, rsvd bits = 0x800f0000001fe000 WARNING: CPU: 152 PID: 15966 at arch/x86/kvm/mmu/spte.c:215 makespte+0x327/0x340 [kvm] Hardware name: Google, Inc. ArcadiaIT80/ArcadiaIT80, BIOS 10.48.0 01/27/2022 RIP: 0010:makespte+0x327/0x340 [kvm] Call Trace: <TASK> tdpmmumaphandletargetlevel+0xc3/0x230 [kvm] kvmtdpmmumap+0x343/0x3b0 [kvm] directpagefault+0x1ae/0x2a0 [kvm] kvmtdppagefault+0x7d/0x90 [kvm] kvmmmupagefault+0xfb/0x2e0 [kvm] npfinterception+0x55/0x90 [kvmamd] svminvokeexithandler+0x31/0xf0 [kvmamd] svmhandleexit+0xf6/0x1d0 [kvmamd] vcpuenterguest+0xb6d/0xee0 [kvm] ? kvmpmutriggerevent+0x6d/0x230 [kvm] vcpurun+0x65/0x2c0 [kvm] kvmarchvcpuioctlrun+0x355/0x610 [kvm] kvmvcpuioctl+0x551/0x610 [kvm] _sesysioctl+0x77/0xc0 _x64sysioctl+0x1d/0x20 dosyscall64+0x44/0xa0 entrySYSCALL64after_hwframe+0x46/0xb0 </TASK> ---[ end trace 0000000000000000 ]---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50224.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b8e8c8303ff28c61046a4d0f6ea99aea609a7dc0
Fixed
6271f2854b9233702e236e576b885a876dde4889
Fixed
6c6ab524cfae0799e55c82b2c1d61f1af0156f8d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
a7ad7943b84fae87f5be18f05025c51ae103f732
Last affected
bb16a6ba5d1ed79b40caea8d924e237f63205b7c
Last affected
5219505fcbb640e273a0d51c19c38de0100ec5a9
Last affected
78ffa84f00ff6b19f00c0e6dfe1870aba0db4025

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.4.0
Fixed
5.19.2