CVE-2022-49610

Source
https://cve.org/CVERecord?id=CVE-2022-49610
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49610.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49610
Downstream
Related
Published
2025-02-26T02:23:33.299Z
Modified
2026-03-20T12:22:27.702946Z
Summary
KVM: VMX: Prevent RSB underflow before vmenter
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Prevent RSB underflow before vmenter

On VMX, there are some balanced returns between the time the guest's SPEC_CTRL value is written, and the vmenter.

Balanced returns (matched by a preceding call) are usually ok, but it's at least theoretically possible an NMI with a deep call stack could empty the RSB before one of the returns.

For maximum paranoia, don't allow any returns (balanced or otherwise) between the SPEC_CTRL write and the vmenter.

[ bp: Fix 32-bit build. ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49610.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d28b387fb74da95d69d2615732f50cceb38e9a4d
Fixed
afd743f6dde87296c6f3414706964c491bb85862
Fixed
07853adc29a058c5fd143c14e5ac528448a72ed9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
44491a23b73789c0a914af4ea55ccf8968adf90b
Last affected
fc6aae9f407810cb153a9133c28735871f9f0a16

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49610.json"