CVE-2022-49932

Source
https://cve.org/CVERecord?id=CVE-2022-49932
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49932.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49932
Downstream
Published
2025-05-02T15:54:53.215Z
Modified
2026-03-12T03:25:58.170244Z
Summary
KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Do all initialization before exposing /dev/kvm to userspace

Call kvminit() only after all setup is complete, as kvminit() exposes /dev/kvm to userspace and thus allows userspace to create VMs (and call other ioctls). E.g. KVM will encounter a NULL pointer when attempting to add a vCPU to the per-CPU loadedvmcssoncpu list if userspace is able to create a VM before vmxinit() configures said list.

BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor write access in kernel mode #PF: errorcode(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] SMP CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:vmxvcpuloadvmcs+0x68/0x230 [kvmintel] <TASK> vmxvcpuload+0x16/0x60 [kvmintel] kvmarchvcpuload+0x32/0x1f0 [kvm] vcpuload+0x2f/0x40 [kvm] kvmarchvcpucreate+0x231/0x310 [kvm] kvmvmioctl+0x79f/0xe10 [kvm] ? handlemm_fault+0xb1/0x220 _x64sysioctl+0x80/0xb0 dosyscall64+0x2b/0x50 entrySYSCALL64afterhwframe+0x46/0xb0 RIP: 0033:0x7f5a6b05743b </TASK> Modules linked in: vhostnet vhost vhostiotlb tap kvmintel(+) kvm irqbypass

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49932.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dbef2808af6c594922fe32833b30f55f35e9da6d
Fixed
e136e969d268b9b89329c816c002e53f60e82985
Fixed
e28533c08023c4b319b7f2cd77f3f7c9204eb517
Fixed
e32b120071ea114efc0b4ddd439547750b85f618
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
b2f7d0adc1260fa33ff3e992d18ff15873e68a67
Last affected
2c0bf2560ca18abe1451db23b8ef8700c67cc44f
Last affected
f9971a898a815c2a6cce2932e91a576b28ed4cce
Last affected
40888c31aca3a46f266f1f121679f8e1982df085
Last affected
cd3f438fbb9cb60da32dd2b665f7dc9baba1c4ad
Last affected
e35a2dc8c7f664ae8a9cc46d19985dc79bfc1083

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49932.json"