CVE-2022-50008
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the kprobes subsystem, where the function __disable_kprobe() incorrectly attempts to disarm an already disabled kprobe. This triggers a WARN_ONCE() warning and causes improper cleanup, leaving an aggregated kprobe in a hash table that creates an infinite loop. This infinite loop can cause commands that interact with kprobes, such as reading the kprobes list or running execsnoop, to hang, resulting in RCU stalls or soft lockups.
How can this vulnerability impact me? :
The vulnerability can cause system commands that interact with kprobes to enter infinite loops, leading to RCU stalls or soft lockups. This can degrade system stability and responsiveness, potentially causing system hangs or crashes when using debugging or tracing tools like execsnoop.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the status of kprobes and observing if WARN_ONCE() warnings occur due to disarming disabled kprobes. Suggested commands include: 1. Disable kprobes by writing 0 to /sys/kernel/debug/kprobes/enabled: # echo 0 > /sys/kernel/debug/kprobes/enabled 2. Run execsnoop to monitor execve system calls: # /usr/share/bcc/tools/execsnoop & 3. Check the list of kprobes: # cat /sys/kernel/debug/kprobes/list 4. Re-enable kprobes by writing 1 to /sys/kernel/debug/kprobes/enabled: # echo 1 > /sys/kernel/debug/kprobes/enabled 5. Kill execsnoop and observe if WARN_ONCE() is fired, indicating the issue. If commands like 'cat /sys/kernel/debug/kprobes/list' or 'execsnoop' hang or cause RCU stalls or soft lockups, it indicates the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the kernel does not call disarm_kprobe() for disabled kprobes. Practically, this means applying the patch or update that fixes the assumption in __disable_kprobe() so it does not attempt to disarm already disarmed kprobes. Until then, avoid operations that disable and re-enable kprobes in a way that triggers this issue, such as running execsnoop with kprobes disabled and then re-enabled. Monitoring for WARN_ONCE() warnings and avoiding use of affected kprobe operations can help mitigate immediate risk.