In the Linux kernel, the following vulnerability has been resolved:
x86/kprobes: Update kcb status flag after singlestepping
Fix kprobes to update kcb (kprobes control block) status flag to
KPROBE_HIT_SSDONE even if the kp->post_handler is not set.
This bug may cause a kernel panic if another INT3 user runs right
after kprobes because kprobe_int3_handler() misunderstands the
INT3 is kprobe's single stepping INT3.
References
Configurations
Configuration 1 (hide)
|
History
19 Nov 2025, 14:26
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/1cbf3882cb372bbe752efd7c3045ca1c9ab40ac6 - Patch | |
| References | () https://git.kernel.org/stable/c/663cdda2716b70751df9c7e60b81bd0850fdfe3c - Patch | |
| References | () https://git.kernel.org/stable/c/b9c3401f7cac6ae291a16784dadcd1bf116218fe - Patch | |
| References | () https://git.kernel.org/stable/c/dec8784c9088b131a1523f582c2194cfc8107dc0 - Patch | |
| References | () https://git.kernel.org/stable/c/edc2ac7c7265b33660fa0190898966b49966b855 - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-19 14:26
NVD link : CVE-2022-50096
Mitre link : CVE-2022-50096
CVE.ORG link : CVE-2022-50096
JSON object : View
Products Affected
linux
- linux_kernel
CWE
