CVE-2022-50075
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tracing/eprobes: Have event probes be consistent with kprobes and uprobes<br />
<br />
Currently, if a symbol "@" is attempted to be used with an event probe<br />
(eprobes), it will cause a NULL pointer dereference crash.<br />
<br />
Both kprobes and uprobes can reference data other than the main registers.<br />
Such as immediate address, symbols and the current task name. Have eprobes<br />
do the same thing.<br />
<br />
For "comm", if "comm" is used and the event being attached to does not<br />
have the "comm" field, then make it the "$comm" that kprobes has. This is<br />
consistent to the way histograms and filters work.