5.5

CVE-2022-50266

In the Linux kernel, the following vulnerability has been resolved:

kprobes: Fix check for probe enabled in kill_kprobe()

In kill_kprobe(), the check whether disarm_kprobe_ftrace() needs to be
called always fails. This is because before that we set the
KPROBE_FLAG_GONE flag for kprobe so that "!kprobe_disabled(p)" is always
false.

The disarm_kprobe_ftrace() call introduced by commit:

  0cb2f1372baa ("kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler")

to fix the NULL pointer reference problem. When the probe is enabled, if
we do not disarm it, this problem still exists.

Fix it by putting the probe enabled check before setting the
KPROBE_FLAG_GONE flag.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.4.238 < 4.5
LinuxLinux Kernel Version >= 4.9.238 < 4.10
LinuxLinux Kernel Version >= 4.14.200 < 4.15
LinuxLinux Kernel Version >= 4.19.149 < 4.20
LinuxLinux Kernel Version >= 5.4.69 < 5.5
LinuxLinux Kernel Version >= 5.8.13 < 5.9
LinuxLinux Kernel Version >= 5.9.1 < 6.0.16
LinuxLinux Kernel Version >= 6.1 < 6.1.2
LinuxLinux Kernel Version5.9 Update-
LinuxLinux Kernel Version5.9 Updaterc7
LinuxLinux Kernel Version5.9 Updaterc8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.034
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.