In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race where eprobes can be called before the event
The flag that tells the event to call its triggers after reading the event
is set for eprobes after the eprobe is enabled. This leads to a race where
the eprobe may be triggered at the beginning of the event where the record
information is NULL. The eprobe then dereferences the NULL record causing
a NULL kernel pointer bug.
Test for a NULL record to keep this from happening.
Metrics
Affected Vendors & Products
References
History
Fri, 02 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 01 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race where eprobes can be called before the event The flag that tells the event to call its triggers after reading the event is set for eprobes after the eprobe is enabled. This leads to a race where the eprobe may be triggered at the beginning of the event where the record information is NULL. The eprobe then dereferences the NULL record causing a NULL kernel pointer bug. Test for a NULL record to keep this from happening. | |
Title | tracing: Fix race where eprobes can be called before the event | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-01T14:09:27.722Z
Updated: 2025-05-04T08:45:35.052Z
Reserved: 2025-05-01T14:05:17.224Z
Link: CVE-2022-49798

No data.

Status : Awaiting Analysis
Published: 2025-05-01T15:16:03.097
Modified: 2025-05-02T13:53:20.943
Link: CVE-2022-49798
