Skip to main content

CVE-2022-49932: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49932cvecve-2022-49932
Published: Fri May 02 2025 (05/02/2025, 15:54:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace Call kvm_init() only after _all_ setup is complete, as kvm_init() exposes /dev/kvm to userspace and thus allows userspace to create VMs (and call other ioctls). E.g. KVM will encounter a NULL pointer when attempting to add a vCPU to the per-CPU loaded_vmcss_on_cpu list if userspace is able to create a VM before vmx_init() configures said list. BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] SMP CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:vmx_vcpu_load_vmcs+0x68/0x230 [kvm_intel] <TASK> vmx_vcpu_load+0x16/0x60 [kvm_intel] kvm_arch_vcpu_load+0x32/0x1f0 [kvm] vcpu_load+0x2f/0x40 [kvm] kvm_arch_vcpu_create+0x231/0x310 [kvm] kvm_vm_ioctl+0x79f/0xe10 [kvm] ? handle_mm_fault+0xb1/0x220 __x64_sys_ioctl+0x80/0xb0 do_syscall_64+0x2b/0x50 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f5a6b05743b </TASK> Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel(+) kvm irqbypass

AI-Powered Analysis

AILast updated: 06/29/2025, 20:54:42 UTC

Technical Analysis

CVE-2022-49932 is a vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the VMX (Intel virtualization extensions) implementation. The issue arises because the kernel exposes the /dev/kvm interface to userspace before completing all necessary internal initialization steps. The vulnerability occurs when the kernel calls kvm_init(), which makes /dev/kvm accessible to userspace, allowing userspace processes to create virtual machines and invoke various ioctls. However, if userspace creates a VM before the vmx_init() function has fully configured internal data structures—such as the per-CPU loaded_vmcss_on_cpu list—the kernel may attempt to dereference a NULL pointer. This leads to a kernel NULL pointer dereference and a consequent kernel oops (crash), as demonstrated by the provided stack trace. The crash occurs in the vmx_vcpu_load_vmcs function within the kvm_intel module. This flaw can cause a denial of service (DoS) by crashing the host kernel or potentially lead to other undefined behaviors. The vulnerability does not require privileged access beyond the ability to open /dev/kvm, which is typically restricted to certain users or groups. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a race condition or improper sequencing in the initialization of KVM VMX internals before exposing the interface to userspace, allowing premature VM creation that triggers the NULL pointer dereference.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments running Linux hosts with KVM virtualization enabled, particularly those using Intel CPUs with VMX support. Organizations relying on virtualized infrastructure for cloud services, private clouds, or internal virtualization could experience host kernel crashes leading to denial of service. This can disrupt critical services, degrade availability, and cause operational downtime. While the vulnerability does not directly indicate privilege escalation or arbitrary code execution, the ability to crash the kernel from userspace can be leveraged in multi-tenant environments to impact other tenants or services. This is especially relevant for data centers, cloud providers, and enterprises using Linux-based virtualization stacks. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any exposed /dev/kvm interface could be targeted by malicious insiders or compromised users. The impact on confidentiality and integrity is limited based on current information, but availability impact is significant due to potential kernel panics. European organizations with strict uptime and service level agreements (SLAs) may face compliance and reputational risks if affected.

Mitigation Recommendations

To mitigate CVE-2022-49932, European organizations should: 1) Apply the latest Linux kernel patches that address this issue as soon as they become available, ensuring that the KVM subsystem initialization order is corrected. 2) Restrict access to /dev/kvm to only trusted users and processes, minimizing the risk of unprivileged users triggering the vulnerability. 3) Implement strict user and group permissions on virtualization hosts to prevent unauthorized VM creation. 4) Monitor kernel logs and system behavior for signs of unexpected kernel oops or crashes related to KVM operations. 5) In environments where patching is delayed, consider disabling KVM VMX support temporarily if feasible, or restrict virtualization capabilities to reduce attack surface. 6) Employ runtime security tools that can detect abnormal ioctl calls or suspicious VM creation patterns. 7) For cloud providers, isolate tenants and enforce strong access controls to prevent cross-tenant exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and temporary operational mitigations until patches are deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.254Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe409d

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:54:42 PM

Last updated: 8/1/2025, 12:24:56 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats