CVE-2022-50096
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's kprobes feature on x86 architectures. The issue is that the kprobes control block (kcb) status flag was not properly updated after single stepping when the post_handler was not set. This caused the kernel to misinterpret an INT3 interrupt, potentially leading to a kernel panic if another INT3 user runs immediately after kprobes.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which is a system crash, if another INT3 user runs right after kprobes. This can lead to system instability or downtime.