๐Ÿ” CVE Alert

CVE-2022-49932

UNKNOWN 0.0

KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace Call kvm_init() only after _all_ setup is complete, as kvm_init() exposes /dev/kvm to userspace and thus allows userspace to create VMs (and call other ioctls). E.g. KVM will encounter a NULL pointer when attempting to add a vCPU to the per-CPU loaded_vmcss_on_cpu list if userspace is able to create a VM before vmx_init() configures said list. BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] SMP CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:vmx_vcpu_load_vmcs+0x68/0x230 [kvm_intel] <TASK> vmx_vcpu_load+0x16/0x60 [kvm_intel] kvm_arch_vcpu_load+0x32/0x1f0 [kvm] vcpu_load+0x2f/0x40 [kvm] kvm_arch_vcpu_create+0x231/0x310 [kvm] kvm_vm_ioctl+0x79f/0xe10 [kvm] ? handle_mm_fault+0xb1/0x220 __x64_sys_ioctl+0x80/0xb0 do_syscall_64+0x2b/0x50 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f5a6b05743b </TASK> Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel(+) kvm irqbypass

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dbef2808af6c594922fe32833b30f55f35e9da6d < e136e969d268b9b89329c816c002e53f60e82985 dbef2808af6c594922fe32833b30f55f35e9da6d < e28533c08023c4b319b7f2cd77f3f7c9204eb517 dbef2808af6c594922fe32833b30f55f35e9da6d < e32b120071ea114efc0b4ddd439547750b85f618 b2f7d0adc1260fa33ff3e992d18ff15873e68a67 2c0bf2560ca18abe1451db23b8ef8700c67cc44f f9971a898a815c2a6cce2932e91a576b28ed4cce 40888c31aca3a46f266f1f121679f8e1982df085 cd3f438fbb9cb60da32dd2b665f7dc9baba1c4ad e35a2dc8c7f664ae8a9cc46d19985dc79bfc1083
Linux / Linux
5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e136e969d268b9b89329c816c002e53f60e82985 git.kernel.org: https://git.kernel.org/stable/c/e28533c08023c4b319b7f2cd77f3f7c9204eb517 git.kernel.org: https://git.kernel.org/stable/c/e32b120071ea114efc0b4ddd439547750b85f618