In the Linux kernel, the following vulnerability has been resolved:
KVM: x86/xen: Initialize Xen timer only once
Add a check for existing xen timers before initializing a new one.
Currently kvmxeninittimer() is called on every KVMXENVCPUATTRTYPETIMER, which is causing the following ODEBUG crash when vcpu->arch.xen.timer is already set.
ODEBUG: init active (active state 0) object type: hrtimer hint: xentimercallbac0 RIP: 0010:debugprintobject+0x16e/0x250 lib/debugobjects.c:502 Call Trace: _debugobjectinit debughrtimerinit debuginit hrtimerinit kvmxeninittimer kvmxenvcpusetattr kvmarchvcpuioctl kvmvcpuioctl vfsioctl
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50227.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "arch/x86/kvm/xen.c",
"function": "kvm_xen_vcpu_set_attr"
},
"id": "CVE-2022-50227-15682096",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af735db31285fa699384c649be72a9f32ecbb665",
"digest": {
"function_hash": "334448388018895477923148161510218324449",
"length": 5173.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "arch/x86/kvm/xen.c"
},
"id": "CVE-2022-50227-7d3e3dc1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af735db31285fa699384c649be72a9f32ecbb665",
"digest": {
"line_hashes": [
"304832671344299983688768872278973424206",
"329104595591519148452607042389380520998",
"10722711034171336562387614460802435045",
"301200193194119927726457539090771509991"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50227.json"