CVE-2022-50579
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's arm64 architecture and its ftrace feature, specifically related to module Procedure Linkage Tables (PLTs) and the mcount function used for tracing. A recent commit changed how PLTs are handled, causing issues when modules are loaded far from the kernel. The problem arises because mcount callsites in modules are initialized to point to module PLTs, but the ftrace code assumes they point to a special ftrace trampoline PLT. This mismatch causes ftrace to fail when initializing callsites, leading to kernel errors and warnings, including a kernel taint and a crash-like splat. The fix reverts to the previous behavior of ignoring the old instruction when initializing mcount callsites in modules.
How can this vulnerability impact me? :
This vulnerability can cause kernel instability or crashes when loading certain kernel modules on arm64 systems using ftrace with mcount. It may result in kernel tainting and warnings, potentially affecting system reliability and debugging. This could disrupt normal system operations or module loading processes.