{"vulnerability": "CVE-2022-50227", "sightings": [{"uuid": "aa8277d7-bcbe-4d9e-bfac-72921c6f24b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-50227", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrveky3n2x2m", "content": "", "creation_timestamp": "2025-06-18T15:53:39.250893Z"}, {"uuid": "cbaa610b-c091-42e9-9b3d-af341c2e62dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-50227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18723", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-50227\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86/xen: Initialize Xen timer only once\n\nAdd a check for existing xen timers before initializing a new one.\n\nCurrently kvm_xen_init_timer() is called on every\nKVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG\ncrash when vcpu-&gt;arch.xen.timer is already set.\n\nODEBUG: init active (active state 0)\nobject type: hrtimer hint: xen_timer_callbac0\nRIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502\nCall Trace:\n__debug_object_init\ndebug_hrtimer_init\ndebug_init\nhrtimer_init\nkvm_xen_init_timer\nkvm_xen_vcpu_set_attr\nkvm_arch_vcpu_ioctl\nkvm_vcpu_ioctl\nvfs_ioctl\n\ud83d\udccf Published: 2025-06-18T11:03:59.885Z\n\ud83d\udccf Modified: 2025-06-18T11:03:59.885Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9a9b5771e930f408c3419799000f76a9abaf2278\n2. https://git.kernel.org/stable/c/af735db31285fa699384c649be72a9f32ecbb665", "creation_timestamp": "2025-06-18T11:38:25.000000Z"}]}