CVE-2022-50227

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KVM: x86/xen: Initialize Xen timer only once<br /> <br /> Add a check for existing xen timers before initializing a new one.<br /> <br /> Currently kvm_xen_init_timer() is called on every<br /> KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG<br /> crash when vcpu-&gt;arch.xen.timer is already set.<br /> <br /> ODEBUG: init active (active state 0)<br /> object type: hrtimer hint: xen_timer_callbac0<br /> RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502<br /> Call Trace:<br /> __debug_object_init<br /> debug_hrtimer_init<br /> debug_init<br /> hrtimer_init<br /> kvm_xen_init_timer<br /> kvm_xen_vcpu_set_attr<br /> kvm_arch_vcpu_ioctl<br /> kvm_vcpu_ioctl<br /> vfs_ioctl

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19 (including) 5.19.2 (excluding)