CVE-2022-50227
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's KVM module for x86/xen, where the Xen timer is initialized multiple times without checking if it already exists. Specifically, the function kvm_xen_init_timer() is called repeatedly for every KVM_XEN_VCPU_ATTR_TYPE_TIMER, causing a crash (ODEBUG) when the timer is already set. The fix adds a check to initialize the Xen timer only once to prevent this crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to multiple initializations of the Xen timer in the KVM module. Such crashes can lead to system instability or denial of service on systems using KVM with Xen virtualization.