In the Linux kernel, the following vulnerability has been resolved:
KVM: x86/xen: Initialize Xen timer only once
Add a check for existing xen timers before initializing a new one.
Currently kvm_xen_init_timer() is called on every
KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG
crash when vcpu->arch.xen.timer is already set.
ODEBUG: init active (active state 0)
object type: hrtimer hint: xen_timer_callbac0
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502
Call Trace:
__debug_object_init
debug_hrtimer_init
debug_init
hrtimer_init
kvm_xen_init_timer
kvm_xen_vcpu_set_attr
kvm_arch_vcpu_ioctl
kvm_vcpu_ioctl
vfs_ioctl
References
Configurations
History
19 Nov 2025, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/9a9b5771e930f408c3419799000f76a9abaf2278 - Patch | |
| References | () https://git.kernel.org/stable/c/af735db31285fa699384c649be72a9f32ecbb665 - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-19 12:57
NVD link : CVE-2022-50227
Mitre link : CVE-2022-50227
CVE.ORG link : CVE-2022-50227
JSON object : View
Products Affected
linux
- linux_kernel
CWE
