Bug 2363722 (CVE-2022-49933) - CVE-2022-49933 kernel: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling
Summary: CVE-2022-49933 kernel: KVM: VMX: Reset eVMCS controls in VP assist page durin...
Keywords:
Status: NEW
Alias: CVE-2022-49933
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-02 16:03 UTC by OSIDB Bzimport
Modified: 2025-07-09 15:25 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-02 16:03:13 UTC
In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling

Reset the eVMCS controls in the per-CPU VP assist page during hardware
disabling instead of waiting until kvm-intel's module exit.  The controls
are activated if and only if KVM creates a VM, i.e. don't need to be
reset if hardware is never enabled.

Doing the reset during hardware disabling will naturally fix a potential
NULL pointer deref bug once KVM disables CPU hotplug while enabling and
disabling hardware (which is necessary to fix a variety of bugs).  If the
kernel is running as the root partition, the VP assist page is unmapped
during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs
to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to
write to a CPU's VP assist page after it's unmapped.

Comment 1 Avinash Hanwate 2025-05-05 05:46:36 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050200-CVE-2022-49933-2147@gregkh/T

Comment 4 TEJ RATHI 2025-05-29 06:38:27 UTC
This CVE has been rejected by the Linux kernel community. Refer to the announcement: https://lore.kernel.org/linux-cve-announce/2025052015-REJECTED-c0d0@gregkh/

Comment added by: Automated Script


Note You need to log in before you can comment on or make changes to this bug.