๐Ÿ” CVE Alert

CVE-2022-49779

UNKNOWN 0.0

kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case In __unregister_kprobe_top(), if the currently unregistered probe has post_handler but other child probes of the aggrprobe do not have post_handler, the post_handler of the aggrprobe is cleared. If this is a ftrace-based probe, there is a problem. In later calls to disarm_kprobe(), we will use kprobe_ftrace_ops because post_handler is NULL. But we're armed with kprobe_ipmodify_ops. This triggers a WARN in __disarm_kprobe_ftrace() and may even cause use-after-free: Failed to disarm kprobe-ftrace at kernel_clone+0x0/0x3c0 (error -2) WARNING: CPU: 5 PID: 137 at kernel/kprobes.c:1135 __disarm_kprobe_ftrace.isra.21+0xcf/0xe0 Modules linked in: testKprobe_007(-) CPU: 5 PID: 137 Comm: rmmod Not tainted 6.1.0-rc4-dirty #18 [...] Call Trace: <TASK> __disable_kprobe+0xcd/0xe0 __unregister_kprobe_top+0x12/0x150 ? mutex_lock+0xe/0x30 unregister_kprobes.part.23+0x31/0xa0 unregister_kprobe+0x32/0x40 __x64_sys_delete_module+0x15e/0x260 ? do_user_addr_fault+0x2cd/0x6b0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd [...] For the kprobe-on-ftrace case, we keep the post_handler setting to identify this aggrprobe armed with kprobe_ipmodify_ops. This way we can disarm it correctly.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0bc11ed5ab60c135aa764a62c02cd5ea68289de4 < 7b0007b28dd970176f2e297c06ae63eea2447127 0bc11ed5ab60c135aa764a62c02cd5ea68289de4 < 7d606ae1abcc3eab5408e42444d789dc7def51b8 0bc11ed5ab60c135aa764a62c02cd5ea68289de4 < c49cc2c059b503e962c2f13a806c105f9b757df4 0bc11ed5ab60c135aa764a62c02cd5ea68289de4 < 55788ebbe8b365b4375bd56b4ba7db79d393a370 0bc11ed5ab60c135aa764a62c02cd5ea68289de4 < 5dd7caf0bdc5d0bae7cf9776b4d739fb09bd5ebb
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7b0007b28dd970176f2e297c06ae63eea2447127 git.kernel.org: https://git.kernel.org/stable/c/7d606ae1abcc3eab5408e42444d789dc7def51b8 git.kernel.org: https://git.kernel.org/stable/c/c49cc2c059b503e962c2f13a806c105f9b757df4 git.kernel.org: https://git.kernel.org/stable/c/55788ebbe8b365b4375bd56b4ba7db79d393a370 git.kernel.org: https://git.kernel.org/stable/c/5dd7caf0bdc5d0bae7cf9776b4d739fb09bd5ebb