CVE-2022-50553 — Out-of-bounds Write in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateApr 20
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'
When generate a synthetic event with many params and then create a trace
action for it [1], kernel panic happened [2].
It is because that in trace_action_create() 'data->n_params' is up to
SYNTH_FIELDS_MAX (current value is 64), and array 'data->var_ref_idx'
keeps indices into array 'hist_data->var_refs' for each synthetic event
param, but the length of 'data->…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux38b67e60b6b582e81f9db1b2e7176cbbfbd3e574 — cf79d5410a569dad1d4112b5c3c02383cca8213a+7
Patches
🔴Vulnerability Details
3VulDB▶
Linux Kernel up to 6.1.3 trace_action_create denial of service (EUVD-2025-31984 / Nessus ID 278484)↗2026-04-20
GHSA▶
GHSA-rvj3-h2c8-jjxg: In the Linux kernel, the following vulnerability has been resolved:
tracing/hist: Fix out-of-bound write on 'action_data↗2025-10-07
OSV▶
CVE-2022-50553: In the Linux kernel, the following vulnerability has been resolved: tracing/hist: Fix out-of-bound write on 'action_data↗2025-10-07