
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48848 affects the Linux kernel's tracing/osnoise functionality. The vulnerability was discovered when using trace-cmd with specific parameters, which resulted in an attempt to unregister an already unregistered tracepoint. This occurs when trace-cmd first stops tracing and then switches the tracer to nop, equivalent to executing a sequence of commands in /sys/kernel/tracing/ (Kernel Git).
The issue manifests when the osnoise tracer stops the workload when no trace instance is actively collecting data, which can happen either by disabling tracing or disabling the tracer itself. The vulnerability was introduced in commit 2fac8d6486d5 ('tracing/osnoise: Allow multiple instances of the same tracer'). When triggered, it generates a kernel warning at kernel/tracepoint.c:404 in the tracepointprobeunregister function (Kernel Git).
When triggered, this vulnerability results in a kernel warning and attempted double unregistration of tracepoints. While this doesn't lead to system compromise, it can affect system stability and debugging capabilities (Kernel Git).
The issue was fixed by using the existing traceosnoisecallback_enabled variable to check if the events and workload are actually active before attempting to deactivate them. The fix was implemented in the Linux kernel through a patch that prevents double unregistration of events (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."