{
  "threat_severity" : "Moderate",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT",
    "id" : "2373498",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373498"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nKVM: x86/mmu: Treat NX as a valid SPTE bit for NPT\nTreat the NX bit as valid when using NPT, as KVM will set the NX bit when\nthe NX huge page mitigation is enabled (mindblowing) and trigger the WARN\nthat fires on reserved SPTE bits being set.\nKVM has required NX support for SVM since commit b26a71a1a5b9 (\"KVM: SVM:\nRefuse to load kvm_amd if NX support is not available\") for exactly this\nreason, but apparently it never occurred to anyone to actually test NPT\nwith the mitigation enabled.\n------------[ cut here ]------------\nspte = 0x800000018a600ee7, level = 2, rsvd bits = 0x800f0000001fe000\nWARNING: CPU: 152 PID: 15966 at arch/x86/kvm/mmu/spte.c:215 make_spte+0x327/0x340 [kvm]\nHardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 10.48.0 01/27/2022\nRIP: 0010:make_spte+0x327/0x340 [kvm]\nCall Trace:\n<TASK>\ntdp_mmu_map_handle_target_level+0xc3/0x230 [kvm]\nkvm_tdp_mmu_map+0x343/0x3b0 [kvm]\ndirect_page_fault+0x1ae/0x2a0 [kvm]\nkvm_tdp_page_fault+0x7d/0x90 [kvm]\nkvm_mmu_page_fault+0xfb/0x2e0 [kvm]\nnpf_interception+0x55/0x90 [kvm_amd]\nsvm_invoke_exit_handler+0x31/0xf0 [kvm_amd]\nsvm_handle_exit+0xf6/0x1d0 [kvm_amd]\nvcpu_enter_guest+0xb6d/0xee0 [kvm]\n? kvm_pmu_trigger_event+0x6d/0x230 [kvm]\nvcpu_run+0x65/0x2c0 [kvm]\nkvm_arch_vcpu_ioctl_run+0x355/0x610 [kvm]\nkvm_vcpu_ioctl+0x551/0x610 [kvm]\n__se_sys_ioctl+0x77/0xc0\n__x64_sys_ioctl+0x1d/0x20\ndo_syscall_64+0x44/0xa0\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\n</TASK>\n---[ end trace 0000000000000000 ]---" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50224\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50224\nhttps://lore.kernel.org/linux-cve-announce/2025061848-CVE-2022-50224-7549@gregkh/T" ],
  "name" : "CVE-2022-50224",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}