CVE-2022-50720 — Reachable Assertion in Linux
Severity
4.4MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/apic: Don't disable x2APIC if locked
The APIC supports two modes, legacy APIC (or xAPIC), and Extended APIC
(or x2APIC). X2APIC mode is mostly compatible with legacy APIC, but
it disables the memory-mapped APIC interface in favor of one that uses
MSRs. The APIC mode is controlled by the EXT bit in the APIC MSR.
The MMIO/xAPIC interface has some problems, most notably the APIC LEAK
[1]. This bug allows an attacker to use t…
Affected Packages4 packages
▶CVEListV5linux/linuxfb209bd891645bb87b9618b724f0b4928e0df3de — 05785ba834f23272f9d23427ae4a80ac505a5296+3
🔴Vulnerability Details
3OSV▶
CVE-2022-50720: In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC↗2025-12-24
GHSA▶
GHSA-pc73-7j79-5x2x: In the Linux kernel, the following vulnerability has been resolved:
x86/apic: Don't disable x2APIC if locked
The APIC supports two modes, legacy API↗2025-12-24