CVE-2022-50224
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 5.4 |
| linux | linux_kernel | 5.4 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's KVM (Kernel-based Virtual Machine) on x86 architectures, specifically in the memory management unit (MMU) handling of nested page tables (NPT). The issue was that the NX (No Execute) bit was not treated as a valid shadow page table entry (SPTE) bit when NPT was used. KVM sets the NX bit when the NX huge page mitigation is enabled, which caused a warning due to reserved bits being set incorrectly. The fix treats the NX bit as valid for NPT, preventing these warnings and potential issues in virtualization environments.
How can this vulnerability impact me? :
This vulnerability could cause warnings and potential instability in virtualized environments using KVM with nested page tables and NX huge page mitigation enabled. It may lead to unexpected behavior or crashes in virtual machines due to improper handling of the NX bit in page tables, affecting system reliability and performance in virtualization scenarios.