CVE-2022-49932: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace Call kvm_init() only after _all_ setup is complete, as kvm_init() exposes /dev/kvm to userspace and thus allows userspace to create VMs (and call other ioctls). E.g. KVM will encounter a NULL pointer when attempting to add a vCPU to the per-CPU loaded_vmcss_on_cpu list if userspace is able to create a VM before vmx_init() configures said list. BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] SMP CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:vmx_vcpu_load_vmcs+0x68/0x230 [kvm_intel] <TASK> vmx_vcpu_load+0x16/0x60 [kvm_intel] kvm_arch_vcpu_load+0x32/0x1f0 [kvm] vcpu_load+0x2f/0x40 [kvm] kvm_arch_vcpu_create+0x231/0x310 [kvm] kvm_vm_ioctl+0x79f/0xe10 [kvm] ? handle_mm_fault+0xb1/0x220 __x64_sys_ioctl+0x80/0xb0 do_syscall_64+0x2b/0x50 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f5a6b05743b </TASK> Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel(+) kvm irqbypass
AI Analysis
Technical Summary
CVE-2022-49932 is a vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the VMX (Intel virtualization extensions) implementation. The issue arises because the kernel exposes the /dev/kvm interface to userspace before completing all necessary internal initialization steps. The vulnerability occurs when the kernel calls kvm_init(), which makes /dev/kvm accessible to userspace, allowing userspace processes to create virtual machines and invoke various ioctls. However, if userspace creates a VM before the vmx_init() function has fully configured internal data structures—such as the per-CPU loaded_vmcss_on_cpu list—the kernel may attempt to dereference a NULL pointer. This leads to a kernel NULL pointer dereference and a consequent kernel oops (crash), as demonstrated by the provided stack trace. The crash occurs in the vmx_vcpu_load_vmcs function within the kvm_intel module. This flaw can cause a denial of service (DoS) by crashing the host kernel or potentially lead to other undefined behaviors. The vulnerability does not require privileged access beyond the ability to open /dev/kvm, which is typically restricted to certain users or groups. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a race condition or improper sequencing in the initialization of KVM VMX internals before exposing the interface to userspace, allowing premature VM creation that triggers the NULL pointer dereference.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments running Linux hosts with KVM virtualization enabled, particularly those using Intel CPUs with VMX support. Organizations relying on virtualized infrastructure for cloud services, private clouds, or internal virtualization could experience host kernel crashes leading to denial of service. This can disrupt critical services, degrade availability, and cause operational downtime. While the vulnerability does not directly indicate privilege escalation or arbitrary code execution, the ability to crash the kernel from userspace can be leveraged in multi-tenant environments to impact other tenants or services. This is especially relevant for data centers, cloud providers, and enterprises using Linux-based virtualization stacks. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any exposed /dev/kvm interface could be targeted by malicious insiders or compromised users. The impact on confidentiality and integrity is limited based on current information, but availability impact is significant due to potential kernel panics. European organizations with strict uptime and service level agreements (SLAs) may face compliance and reputational risks if affected.
Mitigation Recommendations
To mitigate CVE-2022-49932, European organizations should: 1) Apply the latest Linux kernel patches that address this issue as soon as they become available, ensuring that the KVM subsystem initialization order is corrected. 2) Restrict access to /dev/kvm to only trusted users and processes, minimizing the risk of unprivileged users triggering the vulnerability. 3) Implement strict user and group permissions on virtualization hosts to prevent unauthorized VM creation. 4) Monitor kernel logs and system behavior for signs of unexpected kernel oops or crashes related to KVM operations. 5) In environments where patching is delayed, consider disabling KVM VMX support temporarily if feasible, or restrict virtualization capabilities to reduce attack surface. 6) Employ runtime security tools that can detect abnormal ioctl calls or suspicious VM creation patterns. 7) For cloud providers, isolate tenants and enforce strong access controls to prevent cross-tenant exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and temporary operational mitigations until patches are deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-49932: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace Call kvm_init() only after _all_ setup is complete, as kvm_init() exposes /dev/kvm to userspace and thus allows userspace to create VMs (and call other ioctls). E.g. KVM will encounter a NULL pointer when attempting to add a vCPU to the per-CPU loaded_vmcss_on_cpu list if userspace is able to create a VM before vmx_init() configures said list. BUG: kernel NULL pointer dereference, address: 0000000000000008 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 0 P4D 0 Oops: 0002 [#1] SMP CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:vmx_vcpu_load_vmcs+0x68/0x230 [kvm_intel] <TASK> vmx_vcpu_load+0x16/0x60 [kvm_intel] kvm_arch_vcpu_load+0x32/0x1f0 [kvm] vcpu_load+0x2f/0x40 [kvm] kvm_arch_vcpu_create+0x231/0x310 [kvm] kvm_vm_ioctl+0x79f/0xe10 [kvm] ? handle_mm_fault+0xb1/0x220 __x64_sys_ioctl+0x80/0xb0 do_syscall_64+0x2b/0x50 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f5a6b05743b </TASK> Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel(+) kvm irqbypass
AI-Powered Analysis
Technical Analysis
CVE-2022-49932 is a vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically affecting the VMX (Intel virtualization extensions) implementation. The issue arises because the kernel exposes the /dev/kvm interface to userspace before completing all necessary internal initialization steps. The vulnerability occurs when the kernel calls kvm_init(), which makes /dev/kvm accessible to userspace, allowing userspace processes to create virtual machines and invoke various ioctls. However, if userspace creates a VM before the vmx_init() function has fully configured internal data structures—such as the per-CPU loaded_vmcss_on_cpu list—the kernel may attempt to dereference a NULL pointer. This leads to a kernel NULL pointer dereference and a consequent kernel oops (crash), as demonstrated by the provided stack trace. The crash occurs in the vmx_vcpu_load_vmcs function within the kvm_intel module. This flaw can cause a denial of service (DoS) by crashing the host kernel or potentially lead to other undefined behaviors. The vulnerability does not require privileged access beyond the ability to open /dev/kvm, which is typically restricted to certain users or groups. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a race condition or improper sequencing in the initialization of KVM VMX internals before exposing the interface to userspace, allowing premature VM creation that triggers the NULL pointer dereference.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments running Linux hosts with KVM virtualization enabled, particularly those using Intel CPUs with VMX support. Organizations relying on virtualized infrastructure for cloud services, private clouds, or internal virtualization could experience host kernel crashes leading to denial of service. This can disrupt critical services, degrade availability, and cause operational downtime. While the vulnerability does not directly indicate privilege escalation or arbitrary code execution, the ability to crash the kernel from userspace can be leveraged in multi-tenant environments to impact other tenants or services. This is especially relevant for data centers, cloud providers, and enterprises using Linux-based virtualization stacks. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any exposed /dev/kvm interface could be targeted by malicious insiders or compromised users. The impact on confidentiality and integrity is limited based on current information, but availability impact is significant due to potential kernel panics. European organizations with strict uptime and service level agreements (SLAs) may face compliance and reputational risks if affected.
Mitigation Recommendations
To mitigate CVE-2022-49932, European organizations should: 1) Apply the latest Linux kernel patches that address this issue as soon as they become available, ensuring that the KVM subsystem initialization order is corrected. 2) Restrict access to /dev/kvm to only trusted users and processes, minimizing the risk of unprivileged users triggering the vulnerability. 3) Implement strict user and group permissions on virtualization hosts to prevent unauthorized VM creation. 4) Monitor kernel logs and system behavior for signs of unexpected kernel oops or crashes related to KVM operations. 5) In environments where patching is delayed, consider disabling KVM VMX support temporarily if feasible, or restrict virtualization capabilities to reduce attack surface. 6) Employ runtime security tools that can detect abnormal ioctl calls or suspicious VM creation patterns. 7) For cloud providers, isolate tenants and enforce strong access controls to prevent cross-tenant exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and temporary operational mitigations until patches are deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.254Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe409d
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:54:42 PM
Last updated: 8/1/2025, 12:24:56 AM
Views: 8
Related Threats
CVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumResearcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.