{"id":"CVE-2022-1263","details":"A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.","modified":"2026-04-16T04:35:52.209856405Z","published":"2022-08-31T16:15:09.290Z","related":["SUSE-SU-2022:3585-1","SUSE-SU-2022:3844-1","SUSE-SU-2022:4617-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-1263"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072698"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/5593473a1e6c743764b08e3b6071cb43b5cfa6c4"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2022/04/07/1"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1263.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.18"}]},{"events":[{"introduced":"0"},{"last_affected":"5.18-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.18-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}