CVE-2022-50096

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/kprobes: Update kcb status flag after singlestepping<br /> <br /> Fix kprobes to update kcb (kprobes control block) status flag to<br /> KPROBE_HIT_SSDONE even if the kp-&gt;post_handler is not set.<br /> <br /> This bug may cause a kernel panic if another INT3 user runs right<br /> after kprobes because kprobe_int3_handler() misunderstands the<br /> INT3 is kprobe&amp;#39;s single stepping INT3.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.15.61 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19 (including) 5.19.2 (excluding)