We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50227

KVM: x86/xen: Initialize Xen timer only once



Description

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/xen: Initialize Xen timer only once Add a check for existing xen timers before initializing a new one. Currently kvm_xen_init_timer() is called on every KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG crash when vcpu->arch.xen.timer is already set. ODEBUG: init active (active state 0) object type: hrtimer hint: xen_timer_callbac0 RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502 Call Trace: __debug_object_init debug_hrtimer_init debug_init hrtimer_init kvm_xen_init_timer kvm_xen_vcpu_set_attr kvm_arch_vcpu_ioctl kvm_vcpu_ioctl vfs_ioctl

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

536395260582be7443b0b35b0bbb89ffe3947f62 before 9a9b5771e930f408c3419799000f76a9abaf2278
affected

536395260582be7443b0b35b0bbb89ffe3947f62 before af735db31285fa699384c649be72a9f32ecbb665
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/9a9b5771e930f408c3419799000f76a9abaf2278

git.kernel.org/...c/af735db31285fa699384c649be72a9f32ecbb665

cve.org (CVE-2022-50227)

nvd.nist.gov (CVE-2022-50227)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50227

Support options

Helpdesk Chat, Email, Knowledgebase