CVE-2022-50078

5.5 MEDIUM

📋 TL;DR

A vulnerability in the Linux kernel's tracing subsystem allows event probes (eprobes) to incorrectly access register variables like $stack or %reg when they shouldn't, leading to a NULL pointer dereference. This can cause kernel panics and system crashes. Affects Linux systems with kernel tracing enabled and eprobes configured.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution, but generally 5.19-rc5 and earlier affected versions)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires kernel tracing subsystem to be enabled and event probes (eprobes) to be configured or used. Not vulnerable by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash or kernel panic when malicious or misconfigured eprobes attempt to access restricted register variables.

🟢

If Mitigated

No impact if kernel tracing is disabled or eprobes are not used.

🌐 Internet-Facing: LOW - Requires local access and specific kernel tracing configuration.
🏢 Internal Only: MEDIUM - Local users with sufficient privileges could crash systems, but requires specific tracing configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to configure eprobes with specific parameters. The vulnerability was discovered during testing, not in active attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 2673c60ee67e71f2ebe34386e62d348f71edee47, 7c262114a576d94c0ced80e232bbb17391a55908, ba53c21ce9773743b8e0a8ada048c96ff2d55c67

Vendor Advisory: https://git.kernel.org/stable/c/2673c60ee67e71f2ebe34386e62d348f71edee47

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable kernel tracing

linux

Disable the kernel tracing subsystem to prevent eprobe usage

echo 0 > /sys/kernel/debug/tracing/tracing_on
echo 0 > /sys/kernel/debug/tracing/events/enable

Restrict eprobe access

linux

Limit access to eprobe configuration to trusted users only

chmod 600 /sys/kernel/debug/tracing/eprobes
set appropriate SELinux/AppArmor policies

🧯 If You Can't Patch

  • Disable kernel tracing subsystem completely
  • Implement strict access controls to prevent unauthorized users from configuring eprobes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if tracing is enabled: uname -r && cat /sys/kernel/debug/tracing/tracing_on

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains the fix commits or check with distribution-specific security updates

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning NULL pointer dereference in get_event_field.isra.0
  • System crash logs with trace-cmd or eprobe-related errors

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "get_event_field" OR "eprobe")

🔗 References

📤 Share & Export