U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-49933

Change History

CVE Modified by kernel.org 5/20/2025 10:15:26 AM

Action Type Old Value New Value
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling

Reset the eVMCS controls in the per-CPU VP assist page during hardware
disabling instead of waiting until kvm-intel's module exit.  The controls
are activated if and only if KVM creates a VM, i.e. don't need to be
reset if hardware is never enabled.

Doing the reset during hardware disabling will naturally fix a potential
NULL pointer deref bug once KVM disables CPU hotplug while enabling and
disabling hardware (which is necessary to fix a variety of bugs).  If the
kernel is running as the root partition, the VP assist page is unmapped
during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs
to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to
write to a CPU's VP assist page after it's unmapped.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed Reference
kernel.org: https://git.kernel.org/stable/c/01aa8e5704bac9fcd7401eb1a74a375fba594203

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/2916b70fc342719f570640de07251b7f91feebdb

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/afb26bfc01db6ef4728e96314f08431934ffe833

								
						

CVE Rejected by kernel.org 5/20/2025 10:15:26 AM

Action Type Old Value New Value