In the Linux kernel, the following vulnerability has been resolved:
kprobes: Fix check for probe enabled in kill_kprobe()
In kill_kprobe(), the check whether disarm_kprobe_ftrace() needs to be
called always fails. This is because before that we set the
KPROBE_FLAG_GONE flag for kprobe so that "!kprobe_disabled(p)" is always
false.
The disarm_kprobe_ftrace() call introduced by commit:
0cb2f1372baa ("kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler")
to fix the NULL pointer reference problem. When the probe is enabled, if
we do not disarm it, this problem still exists.
Fix it by putting the probe enabled check before setting the
KPROBE_FLAG_GONE flag.
References
Configurations
Configuration 1 (hide)
|
History
02 Dec 2025, 19:27
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/0c76ef3f26d5ef2ac2c21b47e7620cff35809fbb - Patch | |
| References | () https://git.kernel.org/stable/c/c909985dd0c0f74b61e3f8f0e04bf8aa9c8b97c7 - Patch | |
| References | () https://git.kernel.org/stable/c/f20a067f13106565816b4b6a6b665b2088a63824 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:5.9:rc8:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.9:rc7:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Linux |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-02 19:27
NVD link : CVE-2022-50266
Mitre link : CVE-2022-50266
CVE.ORG link : CVE-2022-50266
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
