CVE Identifier: CVE-2022-1852 Issue Description: Avoid calling x86 emulator without a decoded instruction. - The class had a flaw where returned an inaccurate value to the , which lead to issues when in reality the output of x86_decode_emulated_instruction is an EMULATION_ value. - If returns "r = 0", it’s interpreted as EMULATION_OK and x86_emulate_instruction() is executed prematurely resulting in various issues such as running with an obsolete emulation context. Fix Summary: The function call to was relocated within to correct the premature execution. Additionally, is only checked when necessary (e.g. not during VMEXIT). Reporters: Qiuhae Li, Gaoning Pan, Yongkang Jia Fixes: Addressed a prior related commit ( ) which introduced the bug. Date Committed: May 25, 2022