5.5
CVE-2022-50266
- EPSS 0.02%
- Veröffentlicht 15.09.2025 14:21:02
- Zuletzt bearbeitet 02.12.2025 19:27:30
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
kprobes: Fix check for probe enabled in kill_kprobe()
In kill_kprobe(), the check whether disarm_kprobe_ftrace() needs to be
called always fails. This is because before that we set the
KPROBE_FLAG_GONE flag for kprobe so that "!kprobe_disabled(p)" is always
false.
The disarm_kprobe_ftrace() call introduced by commit:
0cb2f1372baa ("kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler")
to fix the NULL pointer reference problem. When the probe is enabled, if
we do not disarm it, this problem still exists.
Fix it by putting the probe enabled check before setting the
KPROBE_FLAG_GONE flag.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.4.238 < 4.5
Linux ≫ Linux Kernel Version >= 4.9.238 < 4.10
Linux ≫ Linux Kernel Version >= 4.14.200 < 4.15
Linux ≫ Linux Kernel Version >= 4.19.149 < 4.20
Linux ≫ Linux Kernel Version >= 5.4.69 < 5.5
Linux ≫ Linux Kernel Version >= 5.8.13 < 5.9
Linux ≫ Linux Kernel Version >= 5.9.1 < 6.0.16
Linux ≫ Linux Kernel Version >= 6.1 < 6.1.2
Linux ≫ Linux Kernel Version5.9 Update-
Linux ≫ Linux Kernel Version5.9 Updaterc7
Linux ≫ Linux Kernel Version5.9 Updaterc8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.034 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.