CVE-2022-50266

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50266
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50266.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50266
Downstream
Published
2025-09-15T15:15:37Z
Modified
2025-09-15T20:01:25Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

kprobes: Fix check for probe enabled in kill_kprobe()

In killkprobe(), the check whether disarmkprobeftrace() needs to be called always fails. This is because before that we set the KPROBEFLAGGONE flag for kprobe so that "!kprobedisabled(p)" is always false.

The disarmkprobeftrace() call introduced by commit:

0cb2f1372baa ("kprobes: Fix NULL pointer dereference at kprobeftracehandler")

to fix the NULL pointer reference problem. When the probe is enabled, if we do not disarm it, this problem still exists.

Fix it by putting the probe enabled check before setting the KPROBEFLAGGONE flag.

References

Affected packages