Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: You Talkin’ to Me?

      September 20, 2025

      The Psychology Of Trust In AI: A Guide To Measuring And Designing For User Confidence

      September 20, 2025

      This week in AI updates: OpenAI Codex updates, Claude integration in Xcode 26, and more (September 19, 2025)

      September 20, 2025

      Report: The major factors driving employee disengagement in 2025

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Performance Prediction System using Python Machine Learning (ML)

      September 21, 2025
      Recent

      Student Performance Prediction System using Python Machine Learning (ML)

      September 21, 2025

      The attack on the npm ecosystem continues

      September 20, 2025

      Feature Highlight

      September 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025
      Recent

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2022-50228 – QEMU KVM SVM Invalid Interrupt Injection Vulnerability

    CVE-2022-50228 – QEMU KVM SVM Invalid Interrupt Injection Vulnerability

    June 18, 2025

    CVE ID : CVE-2022-50228

    Published : June 18, 2025, 11:15 a.m. | 3 hours, 16 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    KVM: SVM: Don’t BUG if userspace injects an interrupt with GIF=0

    Don’t BUG/WARN on interrupt injection due to GIF being cleared,
    since it’s trivial for userspace to force the situation via
    KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct
    for KVM internally generated injections).

    kernel BUG at arch/x86/kvm/svm/svm.c:3386!
    invalid opcode: 0000 [#1] SMP
    CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
    RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]
    Code: 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53
    RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006
    RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0
    RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
    R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000
    FS: 0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0
    Call Trace:

    inject_pending_event+0x2f7/0x4c0 [kvm]
    kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]
    kvm_vcpu_ioctl+0x26d/0x650 [kvm]
    __x64_sys_ioctl+0x82/0xb0
    do_syscall_64+0x3b/0xc0
    entry_SYSCALL_64_after_hwframe+0x44/0xae

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2022-50229 – ALSA bcd2000 Use-After-Free Vulnerability
    Next Article CVE-2022-50226 – Linux Kernel – CCP Kernel Memory Leak Vulnerability

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    This AMD desktop processor is a beast, and it’s almost 60% off at Amazon

    News & Updates

    FM-Intent: Predicting User Session Intent with Hierarchical Multi-Task Learning

    News & Updates

    How healthy is your home? Ultrahuman’s newest device will tell you

    News & Updates

    Become the Next World’s First Trillionaire Creating Smarter AI Solutions: A Step-by-Step Guidebook

    Artificial Intelligence

    Highlights

    CVE-2025-44955 – RUCKUS Network Director (RND) Hardcoded Password Root Access

    August 4, 2025

    CVE ID : CVE-2025-44955

    Published : Aug. 4, 2025, 4:15 p.m. | 9 hours, 5 minutes ago

    Description : RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain root access vis a weak, hardcoded password.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    How to create a Lottie loading animation

    June 9, 2025

    PlayStation kicks off Summer Sale with massive discounts on your favorite titles

    July 16, 2025

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.