SB2025100873 - Out-of-bounds read in Linux kernel trace
Published: October 8, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2022-50553)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the create_var_ref() and trace_action_create() functions in kernel/trace/trace_events_hist.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/04241956ce8825ff06e06e4083e7b692e9d5f712
- https://git.kernel.org/stable/c/0cb31bd88361edb96cfc622648717ba348f0f4dc
- https://git.kernel.org/stable/c/15697f653399253f9be4ed2a1e03d795f3cfee94
- https://git.kernel.org/stable/c/82470f7d9044842618c847a7166de2b7458157a7
- https://git.kernel.org/stable/c/b4efdc219fb8cfa066c7042e636ab8ad6d7e7494
- https://git.kernel.org/stable/c/cf79d5410a569dad1d4112b5c3c02383cca8213a
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.229