CVE-2022-50553Out-of-bounds Write in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 20

Description

In the Linux kernel, the following vulnerability has been resolved: tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' When generate a synthetic event with many params and then create a trace action for it [1], kernel panic happened [2]. It is because that in trace_action_create() 'data->n_params' is up to SYNTH_FIELDS_MAX (current value is 64), and array 'data->var_ref_idx' keeps indices into array 'hist_data->var_refs' for each synthetic event param, but the length of 'data->

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.4.195.4.229+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux38b67e60b6b582e81f9db1b2e7176cbbfbd3e574cf79d5410a569dad1d4112b5c3c02383cca8213a+7
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.1.3 trace_action_create denial of service (EUVD-2025-31984 / Nessus ID 278484)2026-04-20
GHSA
GHSA-rvj3-h2c8-jjxg: In the Linux kernel, the following vulnerability has been resolved: tracing/hist: Fix out-of-bound write on 'action_data2025-10-07
OSV
CVE-2022-50553: In the Linux kernel, the following vulnerability has been resolved: tracing/hist: Fix out-of-bound write on 'action_data2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'2025-10-07
Debian
CVE-2022-50553: linux - In the Linux kernel, the following vulnerability has been resolved: tracing/his...2022