CVE-2022-49798

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race where eprobes can be called before the event The flag that tells the event to call its triggers after reading the event is set for eprobes after the eprobe is enabled. This leads to a race where the eprobe may be triggered at the beginning of the event where the record information is NULL. The eprobe then dereferences the NULL record causing a NULL kernel pointer bug. Test for a NULL record to keep this from happening.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

07 Nov 2025, 19:32

Type Values Removed Values Added
CWE CWE-362
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/7291dec4f2d17a2d3fd1f789fb41e58476539f21 - () https://git.kernel.org/stable/c/7291dec4f2d17a2d3fd1f789fb41e58476539f21 - Patch
References () https://git.kernel.org/stable/c/73f5191467ffe3af82f27fe0ea6a8c2fac724d3f - () https://git.kernel.org/stable/c/73f5191467ffe3af82f27fe0ea6a8c2fac724d3f - Patch
References () https://git.kernel.org/stable/c/94eedf3dded5fb472ce97bfaf3ac1c6c29c35d26 - () https://git.kernel.org/stable/c/94eedf3dded5fb472ce97bfaf3ac1c6c29c35d26 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7

Information

Published : 2025-05-01 15:16

Updated : 2025-11-07 19:32


NVD link : CVE-2022-49798

Mitre link : CVE-2022-49798

CVE.ORG link : CVE-2022-49798


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')