CVE-2022-49568: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is called when a device fd is closed. Most KVM devices use 1) but Book3s's interrupt controller KVM devices (XICS, XIVE, XIVE-native) use 2) as they need to close and reopen during the machine execution. The error handling in kvm_ioctl_create_device() assumes destroy() is always defined which leads to NULL dereference as discovered by Syzkaller. This adds a checks for destroy!=NULL and adds a missing release(). This is not changing kvm_destroy_devices() as devices with defined release() should have been removed from the KVM devices list by then.
AI Analysis
Technical Summary
CVE-2022-49568 is a vulnerability identified in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically related to device cleanup routines for certain KVM devices on the Book3s architecture. The issue arises from improper handling of device destruction callbacks. KVM devices typically implement two callbacks for cleanup: destroy(), called when the virtual machine (VM) is destroyed, and release(), called when a device file descriptor (fd) is closed. Most KVM devices rely on destroy(), but Book3s interrupt controller devices (XICS, XIVE, XIVE-native) use release() because they require closing and reopening during machine execution. The vulnerability is due to an assumption in the kvm_ioctl_create_device() function that destroy() is always defined. This assumption leads to a NULL pointer dereference when destroy() is missing, causing a kernel crash or denial of service. The flaw was discovered by Syzkaller, a kernel fuzzer. The fix involves adding checks to ensure destroy() is not NULL before dereferencing and adding the missing release() callback implementation. The patch does not alter kvm_destroy_devices() since devices with release() defined should already be removed from the KVM device list by that point. This vulnerability affects Linux kernel versions identified by the given commit hashes and is specific to the Book3s architecture's KVM interrupt controller devices. There are no known exploits in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2022-49568 is the potential for denial of service (DoS) on systems running vulnerable Linux kernels with KVM virtualization enabled on Book3s architecture hardware. While Book3s is a niche architecture primarily used in IBM POWER systems, organizations using such hardware for virtualization workloads could experience kernel crashes due to NULL pointer dereferences triggered by this flaw. This could lead to VM downtime, service interruptions, and potential disruption of critical applications hosted on these VMs. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact on virtualization infrastructure could affect availability and operational continuity. European data centers, cloud providers, and enterprises utilizing IBM POWER-based servers with Linux KVM virtualization should be particularly aware. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or by malicious insiders to disrupt services. Given the specificity to certain hardware and kernel versions, the broader Linux user base is less affected, but organizations with mixed architectures should verify their exposure.
Mitigation Recommendations
Organizations should first identify if they run Linux kernels with KVM enabled on Book3s architecture hardware, particularly those using XICS, XIVE, or XIVE-native interrupt controller devices. Mitigation involves applying the official Linux kernel patches that add the necessary NULL checks and implement the missing release() callback to prevent NULL pointer dereferences. Since this is a kernel-level issue, updating to a patched kernel version is the most effective mitigation. For environments where immediate patching is not feasible, administrators should monitor for unusual kernel crashes or VM disruptions that could indicate exploitation attempts. Additionally, restricting access to KVM device file descriptors and limiting untrusted user interactions with virtualization management interfaces can reduce the risk of triggering the vulnerability. Regularly auditing virtualization host configurations and ensuring that only trusted workloads run on vulnerable hardware can further mitigate risk. Finally, maintaining up-to-date backups and implementing robust VM failover mechanisms will help minimize operational impact in case of a DoS event.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
CVE-2022-49568: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is called when a device fd is closed. Most KVM devices use 1) but Book3s's interrupt controller KVM devices (XICS, XIVE, XIVE-native) use 2) as they need to close and reopen during the machine execution. The error handling in kvm_ioctl_create_device() assumes destroy() is always defined which leads to NULL dereference as discovered by Syzkaller. This adds a checks for destroy!=NULL and adds a missing release(). This is not changing kvm_destroy_devices() as devices with defined release() should have been removed from the KVM devices list by then.
AI-Powered Analysis
Technical Analysis
CVE-2022-49568 is a vulnerability identified in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically related to device cleanup routines for certain KVM devices on the Book3s architecture. The issue arises from improper handling of device destruction callbacks. KVM devices typically implement two callbacks for cleanup: destroy(), called when the virtual machine (VM) is destroyed, and release(), called when a device file descriptor (fd) is closed. Most KVM devices rely on destroy(), but Book3s interrupt controller devices (XICS, XIVE, XIVE-native) use release() because they require closing and reopening during machine execution. The vulnerability is due to an assumption in the kvm_ioctl_create_device() function that destroy() is always defined. This assumption leads to a NULL pointer dereference when destroy() is missing, causing a kernel crash or denial of service. The flaw was discovered by Syzkaller, a kernel fuzzer. The fix involves adding checks to ensure destroy() is not NULL before dereferencing and adding the missing release() callback implementation. The patch does not alter kvm_destroy_devices() since devices with release() defined should already be removed from the KVM device list by that point. This vulnerability affects Linux kernel versions identified by the given commit hashes and is specific to the Book3s architecture's KVM interrupt controller devices. There are no known exploits in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2022-49568 is the potential for denial of service (DoS) on systems running vulnerable Linux kernels with KVM virtualization enabled on Book3s architecture hardware. While Book3s is a niche architecture primarily used in IBM POWER systems, organizations using such hardware for virtualization workloads could experience kernel crashes due to NULL pointer dereferences triggered by this flaw. This could lead to VM downtime, service interruptions, and potential disruption of critical applications hosted on these VMs. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact on virtualization infrastructure could affect availability and operational continuity. European data centers, cloud providers, and enterprises utilizing IBM POWER-based servers with Linux KVM virtualization should be particularly aware. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or by malicious insiders to disrupt services. Given the specificity to certain hardware and kernel versions, the broader Linux user base is less affected, but organizations with mixed architectures should verify their exposure.
Mitigation Recommendations
Organizations should first identify if they run Linux kernels with KVM enabled on Book3s architecture hardware, particularly those using XICS, XIVE, or XIVE-native interrupt controller devices. Mitigation involves applying the official Linux kernel patches that add the necessary NULL checks and implement the missing release() callback to prevent NULL pointer dereferences. Since this is a kernel-level issue, updating to a patched kernel version is the most effective mitigation. For environments where immediate patching is not feasible, administrators should monitor for unusual kernel crashes or VM disruptions that could indicate exploitation attempts. Additionally, restricting access to KVM device file descriptors and limiting untrusted user interactions with virtualization management interfaces can reduce the risk of triggering the vulnerability. Regularly auditing virtualization host configurations and ensuring that only trusted workloads run on vulnerable hardware can further mitigate risk. Finally, maintaining up-to-date backups and implementing robust VM failover mechanisms will help minimize operational impact in case of a DoS event.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.410Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe4492
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:27:49 PM
Last updated: 7/31/2025, 7:47:01 AM
Views: 10
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.