CVE-2022-50075

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
18/06/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing/eprobes: Have event probes be consistent with kprobes and uprobes<br /> <br /> Currently, if a symbol "@" is attempted to be used with an event probe<br /> (eprobes), it will cause a NULL pointer dereference crash.<br /> <br /> Both kprobes and uprobes can reference data other than the main registers.<br /> Such as immediate address, symbols and the current task name. Have eprobes<br /> do the same thing.<br /> <br /> For "comm", if "comm" is used and the event being attached to does not<br /> have the "comm" field, then make it the "$comm" that kprobes has. This is<br /> consistent to the way histograms and filters work.

Impact