
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in the Linux kernel's KVM (Kernel-based Virtual Machine) x86/xen subsystem, tracked as CVE-2022-50227. The issue involves redundant initialization of Xen timers, where kvmxeninittimer() is called repeatedly on every KVMXENVCPUATTRTYPETIMER event (NVD, Debian Tracker).
The vulnerability occurs when kvmxeninittimer() is called multiple times on KVMXENVCPUATTRTYPETIMER events, leading to an ODEBUG crash when vcpu->arch.xen.timer is already set. The crash produces a specific trace pattern: ODEBUG: init active (active state 0) object type: hrtimer hint: xentimercallbac0 RIP: 0010:debugprintobject+0x16e/0x250 lib/debugobjects.c:502 (NVD).
The vulnerability affects the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically impacting the Xen virtualization functionality. When triggered, it causes a kernel crash through the ODEBUG mechanism (Wiz).
The issue has been patched in multiple Linux distributions. For Debian, fixed versions are available in bullseye (5.10.237-1), bookworm (6.1.140-1), and trixie (6.12.31-1). The fix involves adding a check for existing Xen timers before initializing a new one (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."