-

CVE-2022-50096

In the Linux kernel, the following vulnerability has been resolved:

x86/kprobes: Update kcb status flag after singlestepping

Fix kprobes to update kcb (kprobes control block) status flag to
KPROBE_HIT_SSDONE even if the kp->post_handler is not set.

This bug may cause a kernel panic if another INT3 user runs right
after kprobes because kprobe_int3_handler() misunderstands the
INT3 is kprobe's single stepping INT3.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < edc2ac7c7265b33660fa0190898966b49966b855
Version ba7d1dae9fe866abe74bb1e849fb85983b7c4c37
Status affected
Version < 1cbf3882cb372bbe752efd7c3045ca1c9ab40ac6
Version 6256e668b7af9d81472e03c6a171630c08f8858a
Status affected
Version < b9c3401f7cac6ae291a16784dadcd1bf116218fe
Version 6256e668b7af9d81472e03c6a171630c08f8858a
Status affected
Version < 663cdda2716b70751df9c7e60b81bd0850fdfe3c
Version 6256e668b7af9d81472e03c6a171630c08f8858a
Status affected
Version < dec8784c9088b131a1523f582c2194cfc8107dc0
Version 6256e668b7af9d81472e03c6a171630c08f8858a
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.057
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String