This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 20 May 2025 14:45:00 +0000


Tue, 20 May 2025 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling Reset the eVMCS controls in the per-CPU VP assist page during hardware disabling instead of waiting until kvm-intel's module exit. The controls are activated if and only if KVM creates a VM, i.e. don't need to be reset if hardware is never enabled. Doing the reset during hardware disabling will naturally fix a potential NULL pointer deref bug once KVM disables CPU hotplug while enabling and disabling hardware (which is necessary to fix a variety of bugs). If the kernel is running as the root partition, the VP assist page is unmapped during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to write to a CPU's VP assist page after it's unmapped. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling kernel: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling

Mon, 05 May 2025 13:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 02 May 2025 16:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling Reset the eVMCS controls in the per-CPU VP assist page during hardware disabling instead of waiting until kvm-intel's module exit. The controls are activated if and only if KVM creates a VM, i.e. don't need to be reset if hardware is never enabled. Doing the reset during hardware disabling will naturally fix a potential NULL pointer deref bug once KVM disables CPU hotplug while enabling and disabling hardware (which is necessary to fix a variety of bugs). If the kernel is running as the root partition, the VP assist page is unmapped during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to write to a CPU's VP assist page after it's unmapped.
Title KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling
References

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2025-05-20T13:59:14.308Z

Reserved: 2025-05-01T14:05:17.254Z

Link: CVE-2022-49933

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2025-05-02T16:15:22.163

Modified: 2025-05-20T14:15:26.470

Link: CVE-2022-49933

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-02T00:00:00Z

Links: CVE-2022-49933 - Bugzilla

cve-icon OpenCVE Enrichment

No data.