vulnerability

Red Hat: CVE-2022-50096: kernel: x86/kprobes: Update kcb status flag after singlestepping (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:M/C:N/I:N/A:C)
Published
Jun 18, 2025
Added
Jul 9, 2025
Modified
Nov 14, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

x86/kprobes: Update kcb status flag after singlestepping

Fix kprobes to update kcb (kprobes control block) status flag to
KPROBE_HIT_SSDONE even if the kp->post_handler is not set.

This bug may cause a kernel panic if another INT3 user runs right
after kprobes because kprobe_int3_handler() misunderstands the
INT3 is kprobe's single stepping INT3.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-kernelredhat-upgrade-kernel-rt
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.