#VU115502 Input validation error in Linux kernel - CVE-2022-50255
Published: September 16, 2025 / Updated: September 22, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the trace_string() and trace_event_raw_event_synth() functions in kernel/trace/trace_events_synth.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/0934ae9977c27133449b6dd8c6213970e7eece38
- https://git.kernel.org/stable/c/149198d0b884e4606ed1d29b330c70016d878276
- https://git.kernel.org/stable/c/d9c79fbcbdb6cb10c07c85040eaf615180b26c48
- https://git.kernel.org/stable/c/f8bae1853196b52ede50950387f5b48cf83b9815
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3