Bug 2373504 (CVE-2022-50227) - CVE-2022-50227 kernel: KVM: x86/xen: Initialize Xen timer only once
Summary: CVE-2022-50227 kernel: KVM: x86/xen: Initialize Xen timer only once
Keywords:
Status: NEW
Alias: CVE-2022-50227
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-18 12:05 UTC by OSIDB Bzimport
Modified: 2025-06-20 10:06 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-18 12:05:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/xen: Initialize Xen timer only once

Add a check for existing xen timers before initializing a new one.

Currently kvm_xen_init_timer() is called on every
KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG
crash when vcpu->arch.xen.timer is already set.

ODEBUG: init active (active state 0)
object type: hrtimer hint: xen_timer_callbac0
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502
Call Trace:
__debug_object_init
debug_hrtimer_init
debug_init
hrtimer_init
kvm_xen_init_timer
kvm_xen_vcpu_set_attr
kvm_arch_vcpu_ioctl
kvm_vcpu_ioctl
vfs_ioctl

Comment 1 Avinash Hanwate 2025-06-19 21:07:07 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025061849-CVE-2022-50227-890e@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.