CVE-2022-50227
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
19/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: x86/xen: Initialize Xen timer only once<br />
<br />
Add a check for existing xen timers before initializing a new one.<br />
<br />
Currently kvm_xen_init_timer() is called on every<br />
KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG<br />
crash when vcpu->arch.xen.timer is already set.<br />
<br />
ODEBUG: init active (active state 0)<br />
object type: hrtimer hint: xen_timer_callbac0<br />
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502<br />
Call Trace:<br />
__debug_object_init<br />
debug_hrtimer_init<br />
debug_init<br />
hrtimer_init<br />
kvm_xen_init_timer<br />
kvm_xen_vcpu_set_attr<br />
kvm_arch_vcpu_ioctl<br />
kvm_vcpu_ioctl<br />
vfs_ioctl
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 5.19.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



