tracepoints

  1. Linux Kernel Trace Verifier Patch Prevents Use-After-Free (CVE-2025-37938)

    The Linux kernel’s tracing subsystem received a targeted security fix for a subtle but real use‑after‑free risk: the trace event verifier previously skipped certain complex pointer formats such as "%*p..", allowing tracepoints to reference memory that might be freed before a trace reader...
  2. CVE-2025-40324: NFSd Tracepoint Crash and Patch Guide

    A harmless-looking tracehook in the NFS server (nfsd) could crash a system: CVE-2025-40324 patches a fault in nfsd4_read_release that causes the trace_nfsd_read_done tracepoint to crash during a specific pynfs read.testNoFh unit test when kernel tracing is enabled, turning a test scenario into...