Логотип exploitDog
bind:CVE-2022-49933
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-49933

Количество 5

Количество 5

ubuntu логотип

CVE-2022-49933

9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2022-49933

9 месяцев назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-49933

9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-whx7-jg3x-m7fw

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling Reset the eVMCS controls in the per-CPU VP assist page during hardware disabling instead of waiting until kvm-intel's module exit. The controls are activated if and only if KVM creates a VM, i.e. don't need to be reset if hardware is never enabled. Doing the reset during hardware disabling will naturally fix a potential NULL pointer deref bug once KVM disables CPU hotplug while enabling and disabling hardware (which is necessary to fix a variety of bugs). If the kernel is running as the root partition, the VP assist page is unmapped during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to write to a CPU's VP assist page after it's unmapped.

EPSS: Низкий
fstec логотип

BDU:2025-05368

около 3 лет назад

Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-49933

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

9 месяцев назад
redhat логотип
CVE-2022-49933

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling

CVSS3: 5.5
9 месяцев назад
nvd логотип
CVE-2022-49933

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

9 месяцев назад
github логотип
GHSA-whx7-jg3x-m7fw

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Reset eVMCS controls in VP assist page during hardware disabling Reset the eVMCS controls in the per-CPU VP assist page during hardware disabling instead of waiting until kvm-intel's module exit. The controls are activated if and only if KVM creates a VM, i.e. don't need to be reset if hardware is never enabled. Doing the reset during hardware disabling will naturally fix a potential NULL pointer deref bug once KVM disables CPU hotplug while enabling and disabling hardware (which is necessary to fix a variety of bugs). If the kernel is running as the root partition, the VP assist page is unmapped during CPU hot unplug, and so KVM's clearing of the eVMCS controls needs to occur with CPU hot(un)plug disabled, otherwise KVM could attempt to write to a CPU's VP assist page after it's unmapped.

9 месяцев назад
fstec логотип
BDU:2025-05368

Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.8
около 3 лет назад

Уязвимостей на страницу