CVE-2022-50228
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) SVM (Secure Virtual Machine) code occurs when userspace injects an interrupt with the GIF (Global Interrupt Flag) cleared (GIF=0). Previously, this situation caused the kernel to BUG or WARN, which could lead to a kernel crash. The fix prevents the kernel from BUGging in this scenario, as it is trivial for userspace to cause this condition via KVM_SET_VCPU_EVENTS. Essentially, it addresses improper handling of interrupt injection when the interrupt flag is cleared, preventing kernel crashes.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel BUG) when userspace injects an interrupt with the GIF cleared. This could lead to denial of service or instability in virtualized environments using KVM on affected kernels. Attackers or malfunctioning userspace programs could exploit this to disrupt system operation.