CVE-2022-48848 (GCVE-0-2022-48848)

Vulnerability from cvelistv5 – Published: 2024-07-16 12:25 – Updated: 2025-05-04 08:24
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: tracing/osnoise: Do not unregister events twice Nicolas reported that using: # trace-cmd record -e all -M 10 -p osnoise --poll Resulted in the following kernel warning: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370 [...] CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19 RIP: 0010:tracepoint_probe_unregister+0x280/0x370 [...] CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0 Call Trace: <TASK> osnoise_workload_stop+0x36/0x90 tracing_set_tracer+0x108/0x260 tracing_set_trace_write+0x94/0xd0 ? __check_object_size.part.0+0x10a/0x150 ? selinux_file_permission+0x104/0x150 vfs_write+0xb5/0x290 ksys_write+0x5f/0xe0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff919a18127 [...] ---[ end trace 0000000000000000 ]--- The warning complains about an attempt to unregister an unregistered tracepoint. This happens on trace-cmd because it first stops tracing, and then switches the tracer to nop. Which is equivalent to: # cd /sys/kernel/tracing/ # echo osnoise > current_tracer # echo 0 > tracing_on # echo nop > current_tracer The osnoise tracer stops the workload when no trace instance is actually collecting data. This can be caused both by disabling tracing or disabling the tracer itself. To avoid unregistering events twice, use the existing trace_osnoise_callback_enabled variable to check if the events (and the workload) are actually active before trying to deactivate them.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 2fac8d6486d5c34e2ec7028580142b8209da3f92 , < 4e10787d18379d9b296290c2288097feddef16d4 (git)
Affected: 2fac8d6486d5c34e2ec7028580142b8209da3f92 , < f0cfe17bcc1dd2f0872966b554a148e888833ee9 (git)
Create a notification for this product.
    Linux Linux Affected: 5.16
Unaffected: 0 , < 5.16 (semver)
Unaffected: 5.16.15 , ≤ 5.16.* (semver)
Unaffected: 5.17 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.617Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48848",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:56:31.920630Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:08.935Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/trace/trace_osnoise.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4e10787d18379d9b296290c2288097feddef16d4",
              "status": "affected",
              "version": "2fac8d6486d5c34e2ec7028580142b8209da3f92",
              "versionType": "git"
            },
            {
              "lessThan": "f0cfe17bcc1dd2f0872966b554a148e888833ee9",
              "status": "affected",
              "version": "2fac8d6486d5c34e2ec7028580142b8209da3f92",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "kernel/trace/trace_osnoise.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.16"
            },
            {
              "lessThan": "5.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.15",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.16.15",
                  "versionStartIncluding": "5.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.17",
                  "versionStartIncluding": "5.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/osnoise: Do not unregister events twice\n\nNicolas reported that using:\n\n # trace-cmd record -e all -M 10 -p osnoise --poll\n\nResulted in the following kernel warning:\n\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370\n [...]\n CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19\n RIP: 0010:tracepoint_probe_unregister+0x280/0x370\n [...]\n CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0\n Call Trace:\n  \u003cTASK\u003e\n  osnoise_workload_stop+0x36/0x90\n  tracing_set_tracer+0x108/0x260\n  tracing_set_trace_write+0x94/0xd0\n  ? __check_object_size.part.0+0x10a/0x150\n  ? selinux_file_permission+0x104/0x150\n  vfs_write+0xb5/0x290\n  ksys_write+0x5f/0xe0\n  do_syscall_64+0x3b/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7ff919a18127\n [...]\n ---[ end trace 0000000000000000 ]---\n\nThe warning complains about an attempt to unregister an\nunregistered tracepoint.\n\nThis happens on trace-cmd because it first stops tracing, and\nthen switches the tracer to nop. Which is equivalent to:\n\n  # cd /sys/kernel/tracing/\n  # echo osnoise \u003e current_tracer\n  # echo 0 \u003e tracing_on\n  # echo nop \u003e current_tracer\n\nThe osnoise tracer stops the workload when no trace instance\nis actually collecting data. This can be caused both by\ndisabling tracing or disabling the tracer itself.\n\nTo avoid unregistering events twice, use the existing\ntrace_osnoise_callback_enabled variable to check if the events\n(and the workload) are actually active before trying to\ndeactivate them."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T08:24:40.162Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4"
        },
        {
          "url": "https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9"
        }
      ],
      "title": "tracing/osnoise: Do not unregister events twice",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48848",
    "datePublished": "2024-07-16T12:25:16.457Z",
    "dateReserved": "2024-07-16T11:38:08.912Z",
    "dateUpdated": "2025-05-04T08:24:40.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"5.16.15\", \"matchCriteriaId\": \"83FDEDF2-0E19-4879-91FD-171E66D1B335\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntracing/osnoise: Do not unregister events twice\\n\\nNicolas reported that using:\\n\\n # trace-cmd record -e all -M 10 -p osnoise --poll\\n\\nResulted in the following kernel warning:\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19\\n RIP: 0010:tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0\\n Call Trace:\\n  \u003cTASK\u003e\\n  osnoise_workload_stop+0x36/0x90\\n  tracing_set_tracer+0x108/0x260\\n  tracing_set_trace_write+0x94/0xd0\\n  ? __check_object_size.part.0+0x10a/0x150\\n  ? selinux_file_permission+0x104/0x150\\n  vfs_write+0xb5/0x290\\n  ksys_write+0x5f/0xe0\\n  do_syscall_64+0x3b/0x90\\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\\n RIP: 0033:0x7ff919a18127\\n [...]\\n ---[ end trace 0000000000000000 ]---\\n\\nThe warning complains about an attempt to unregister an\\nunregistered tracepoint.\\n\\nThis happens on trace-cmd because it first stops tracing, and\\nthen switches the tracer to nop. Which is equivalent to:\\n\\n  # cd /sys/kernel/tracing/\\n  # echo osnoise \u003e current_tracer\\n  # echo 0 \u003e tracing_on\\n  # echo nop \u003e current_tracer\\n\\nThe osnoise tracer stops the workload when no trace instance\\nis actually collecting data. This can be caused both by\\ndisabling tracing or disabling the tracer itself.\\n\\nTo avoid unregistering events twice, use the existing\\ntrace_osnoise_callback_enabled variable to check if the events\\n(and the workload) are actually active before trying to\\ndeactivate them.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: rastreo/osnoise: no cancelar el registro de eventos dos veces Nicolas inform\\u00f3 que al usar: # trace-cmd record -e all -M 10 -p osnoise --poll result\\u00f3 en la siguiente advertencia del kernel: ------------[ cortar aqu\\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 1217 en kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370 [ ...] CPU: 0 PID: 1217 Comm: Trace-CMD No contaminado 5.17.0-RC6-Next-20220307-Nico+ #19 RIP: 0010: TRACEPOINT_PROBE_UNREGister+ 0x280/0x370 [...] CR2: 00007ff919b29497 CR3: 00000001099DA4005 CR4: 0000000000170ef0 Seguimiento de llamadas:  osnoise_workload_stop+0x36/0x90 tracing_set_tracer+0x108/0x260 tracing_set_trace_write+0x94/0xd0 ? __check_object_size.part.0+0x10a/0x150 ? selinux_file_permission+0x104/0x150 vfs_write+0xb5/0x290 ksys_write+0x5f/0xe0 do_syscall_64+0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff919a18127 [...] ---[ final de seguimiento 0000000000000000 ]--- La advertencia se queja de un intento de cancelar el registro de un punto de seguimiento no registrado. Esto sucede en trace-cmd porque primero detiene el rastreo y luego cambia el rastreador a nop. Lo que equivale a: # cd /sys/kernel/tracing/ # echo osnoise \u0026gt; current_tracer # echo 0 \u0026gt; tracing_on # echo nop \u0026gt; current_tracer El rastreador osnoise detiene la carga de trabajo cuando ninguna instancia de seguimiento est\\u00e1 recopilando datos. Esto puede deberse tanto a la desactivaci\\u00f3n del rastreo como a la desactivaci\\u00f3n del propio rastreador. Para evitar cancelar el registro de eventos dos veces, use la variable trace_osnoise_callback_enabled existente para verificar si los eventos (y la carga de trabajo) est\\u00e1n realmente activos antes de intentar desactivarlos.\"}]",
      "id": "CVE-2022-48848",
      "lastModified": "2024-11-21T07:34:12.343",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
      "published": "2024-07-16T13:15:12.023",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48848\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-16T13:15:12.023\",\"lastModified\":\"2024-11-21T07:34:12.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntracing/osnoise: Do not unregister events twice\\n\\nNicolas reported that using:\\n\\n # trace-cmd record -e all -M 10 -p osnoise --poll\\n\\nResulted in the following kernel warning:\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19\\n RIP: 0010:tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0\\n Call Trace:\\n  \u003cTASK\u003e\\n  osnoise_workload_stop+0x36/0x90\\n  tracing_set_tracer+0x108/0x260\\n  tracing_set_trace_write+0x94/0xd0\\n  ? __check_object_size.part.0+0x10a/0x150\\n  ? selinux_file_permission+0x104/0x150\\n  vfs_write+0xb5/0x290\\n  ksys_write+0x5f/0xe0\\n  do_syscall_64+0x3b/0x90\\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\\n RIP: 0033:0x7ff919a18127\\n [...]\\n ---[ end trace 0000000000000000 ]---\\n\\nThe warning complains about an attempt to unregister an\\nunregistered tracepoint.\\n\\nThis happens on trace-cmd because it first stops tracing, and\\nthen switches the tracer to nop. Which is equivalent to:\\n\\n  # cd /sys/kernel/tracing/\\n  # echo osnoise \u003e current_tracer\\n  # echo 0 \u003e tracing_on\\n  # echo nop \u003e current_tracer\\n\\nThe osnoise tracer stops the workload when no trace instance\\nis actually collecting data. This can be caused both by\\ndisabling tracing or disabling the tracer itself.\\n\\nTo avoid unregistering events twice, use the existing\\ntrace_osnoise_callback_enabled variable to check if the events\\n(and the workload) are actually active before trying to\\ndeactivate them.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: rastreo/osnoise: no cancelar el registro de eventos dos veces Nicolas inform\u00f3 que al usar: # trace-cmd record -e all -M 10 -p osnoise --poll result\u00f3 en la siguiente advertencia del kernel: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 1217 en kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370 [ ...] CPU: 0 PID: 1217 Comm: Trace-CMD No contaminado 5.17.0-RC6-Next-20220307-Nico+ #19 RIP: 0010: TRACEPOINT_PROBE_UNREGister+ 0x280/0x370 [...] CR2: 00007ff919b29497 CR3: 00000001099DA4005 CR4: 0000000000170ef0 Seguimiento de llamadas:  osnoise_workload_stop+0x36/0x90 tracing_set_tracer+0x108/0x260 tracing_set_trace_write+0x94/0xd0 ? __check_object_size.part.0+0x10a/0x150 ? selinux_file_permission+0x104/0x150 vfs_write+0xb5/0x290 ksys_write+0x5f/0xe0 do_syscall_64+0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff919a18127 [...] ---[ final de seguimiento 0000000000000000 ]--- La advertencia se queja de un intento de cancelar el registro de un punto de seguimiento no registrado. Esto sucede en trace-cmd porque primero detiene el rastreo y luego cambia el rastreador a nop. Lo que equivale a: # cd /sys/kernel/tracing/ # echo osnoise \u0026gt; current_tracer # echo 0 \u0026gt; tracing_on # echo nop \u0026gt; current_tracer El rastreador osnoise detiene la carga de trabajo cuando ninguna instancia de seguimiento est\u00e1 recopilando datos. Esto puede deberse tanto a la desactivaci\u00f3n del rastreo como a la desactivaci\u00f3n del propio rastreador. Para evitar cancelar el registro de eventos dos veces, use la variable trace_osnoise_callback_enabled existente para verificar si los eventos (y la carga de trabajo) est\u00e1n realmente activos antes de intentar desactivarlos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.16.15\",\"matchCriteriaId\":\"83FDEDF2-0E19-4879-91FD-171E66D1B335\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:25:01.617Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48848\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:56:31.920630Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:20.970Z\"}}], \"cna\": {\"title\": \"tracing/osnoise: Do not unregister events twice\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2fac8d6486d5c34e2ec7028580142b8209da3f92\", \"lessThan\": \"4e10787d18379d9b296290c2288097feddef16d4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2fac8d6486d5c34e2ec7028580142b8209da3f92\", \"lessThan\": \"f0cfe17bcc1dd2f0872966b554a148e888833ee9\", \"versionType\": \"git\"}], \"programFiles\": [\"kernel/trace/trace_osnoise.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.16\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.16\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.16.15\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.16.*\"}, {\"status\": \"unaffected\", \"version\": \"5.17\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"kernel/trace/trace_osnoise.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4e10787d18379d9b296290c2288097feddef16d4\"}, {\"url\": \"https://git.kernel.org/stable/c/f0cfe17bcc1dd2f0872966b554a148e888833ee9\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntracing/osnoise: Do not unregister events twice\\n\\nNicolas reported that using:\\n\\n # trace-cmd record -e all -M 10 -p osnoise --poll\\n\\nResulted in the following kernel warning:\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19\\n RIP: 0010:tracepoint_probe_unregister+0x280/0x370\\n [...]\\n CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0\\n Call Trace:\\n  \u003cTASK\u003e\\n  osnoise_workload_stop+0x36/0x90\\n  tracing_set_tracer+0x108/0x260\\n  tracing_set_trace_write+0x94/0xd0\\n  ? __check_object_size.part.0+0x10a/0x150\\n  ? selinux_file_permission+0x104/0x150\\n  vfs_write+0xb5/0x290\\n  ksys_write+0x5f/0xe0\\n  do_syscall_64+0x3b/0x90\\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\\n RIP: 0033:0x7ff919a18127\\n [...]\\n ---[ end trace 0000000000000000 ]---\\n\\nThe warning complains about an attempt to unregister an\\nunregistered tracepoint.\\n\\nThis happens on trace-cmd because it first stops tracing, and\\nthen switches the tracer to nop. Which is equivalent to:\\n\\n  # cd /sys/kernel/tracing/\\n  # echo osnoise \u003e current_tracer\\n  # echo 0 \u003e tracing_on\\n  # echo nop \u003e current_tracer\\n\\nThe osnoise tracer stops the workload when no trace instance\\nis actually collecting data. This can be caused both by\\ndisabling tracing or disabling the tracer itself.\\n\\nTo avoid unregistering events twice, use the existing\\ntrace_osnoise_callback_enabled variable to check if the events\\n(and the workload) are actually active before trying to\\ndeactivate them.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.16.15\", \"versionStartIncluding\": \"5.16\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.17\", \"versionStartIncluding\": \"5.16\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:24:40.162Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48848\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:24:40.162Z\", \"dateReserved\": \"2024-07-16T11:38:08.912Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-16T12:25:16.457Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…