Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-48765
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-20 Jun, 2024 | 11:13
Updated At-23 Dec, 2025 | 13:20
Rejected At-
▼CVE Numbering Authority (CNA)
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC

In the Linux kernel, the following vulnerability has been resolved: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC The below warning is splatting during guest reboot. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm] CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G I 5.17.0-rc1+ #5 RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm] Call Trace: <TASK> kvm_vcpu_ioctl+0x279/0x710 [kvm] __x64_sys_ioctl+0x83/0xb0 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fd39797350b This can be triggered by not exposing tsc-deadline mode and doing a reboot in the guest. The lapic_shutdown() function which is called in sys_reboot path will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode switch between tsc-deadline and oneshot/periodic, which can result in preemption timer be cancelled in apic_update_lvtt(). However, We can't depend on this when not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption timer. Qemu will synchronise states around reset, let's cancel preemption timer under KVM_SET_LAPIC.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/kvm/lapic.c
Default Status
unaffected
Versions
Affected
  • From 8003c9ae204e21204e49816c5ea629357e283b06 before 54b3439c8e70e0bcfea59aeef9dd98908cbbf655 (git)
  • From 8003c9ae204e21204e49816c5ea629357e283b06 before ce55f63f6cea4cab8ae9212f73285648a5baa30d (git)
  • From 8003c9ae204e21204e49816c5ea629357e283b06 before 35fe7cfbab2e81f1afb23fc4212210b1de6d9633 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/kvm/lapic.c
Default Status
affected
Versions
Affected
  • 4.10
Unaffected
  • From 0 before 4.10 (semver)
  • From 5.15.19 through 5.15.* (semver)
  • From 5.16.5 through 5.16.* (semver)
  • From 5.17 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
N/A
https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
N/A
https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
N/A
Hyperlink: https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
x_transferred
https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
x_transferred
https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
x_transferred
Hyperlink: https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found