In the Linux kernel, the following vulnerability has been resolved:
x86/kprobes: Update kcb status flag after singlestepping
Fix kprobes to update kcb (kprobes control block) status flag to KPROBEHITSSDONE even if the kp->post_handler is not set.
This bug may cause a kernel panic if another INT3 user runs right after kprobes because kprobeint3handler() misunderstands the INT3 is kprobe's single stepping INT3.
[
{
"id": "CVE-2022-50096-1b4b8385",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1cbf3882cb372bbe752efd7c3045ca1c9ab40ac6",
"target": {
"file": "arch/x86/kernel/kprobes/core.c",
"function": "kprobe_post_process"
},
"deprecated": false,
"digest": {
"function_hash": "41229282643404801239200487769206838392",
"length": 336.0
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-383af2f7",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1cbf3882cb372bbe752efd7c3045ca1c9ab40ac6",
"target": {
"file": "arch/x86/kernel/kprobes/core.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"300693431547182787205367709841208638000",
"61854436125864210402921620563026079791",
"84771646837592532414101562842427031480",
"59710309174678855217721491779805799206",
"218315196333264766557252617991716624984",
"55875278686036435132014332731713201767",
"14677085327734658438579805711030922738",
"145828426518785063257338453091474979982",
"12169908875594898466296172543692006012",
"33319128945223968264405229108715540464",
"321482318436167685971246621113479188838"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-38b9121a",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@663cdda2716b70751df9c7e60b81bd0850fdfe3c",
"target": {
"file": "arch/x86/kernel/kprobes/core.c",
"function": "kprobe_post_process"
},
"deprecated": false,
"digest": {
"function_hash": "41229282643404801239200487769206838392",
"length": 336.0
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-5ae3346c",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dec8784c9088b131a1523f582c2194cfc8107dc0",
"target": {
"file": "arch/x86/kernel/kprobes/core.c",
"function": "kprobe_post_process"
},
"deprecated": false,
"digest": {
"function_hash": "41229282643404801239200487769206838392",
"length": 336.0
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-6b8f33cc",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@663cdda2716b70751df9c7e60b81bd0850fdfe3c",
"target": {
"file": "arch/x86/kernel/kprobes/core.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"300693431547182787205367709841208638000",
"61854436125864210402921620563026079791",
"84771646837592532414101562842427031480",
"59710309174678855217721491779805799206",
"218315196333264766557252617991716624984",
"55875278686036435132014332731713201767",
"14677085327734658438579805711030922738",
"145828426518785063257338453091474979982",
"12169908875594898466296172543692006012",
"33319128945223968264405229108715540464",
"321482318436167685971246621113479188838"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-6fe0180c",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b9c3401f7cac6ae291a16784dadcd1bf116218fe",
"target": {
"file": "arch/x86/kernel/kprobes/core.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"300693431547182787205367709841208638000",
"61854436125864210402921620563026079791",
"84771646837592532414101562842427031480",
"59710309174678855217721491779805799206",
"218315196333264766557252617991716624984",
"55875278686036435132014332731713201767",
"14677085327734658438579805711030922738",
"145828426518785063257338453091474979982",
"12169908875594898466296172543692006012",
"33319128945223968264405229108715540464",
"321482318436167685971246621113479188838"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-98bb17fc",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dec8784c9088b131a1523f582c2194cfc8107dc0",
"target": {
"file": "arch/x86/kernel/kprobes/core.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"300693431547182787205367709841208638000",
"61854436125864210402921620563026079791",
"84771646837592532414101562842427031480",
"59710309174678855217721491779805799206",
"218315196333264766557252617991716624984",
"55875278686036435132014332731713201767",
"14677085327734658438579805711030922738",
"145828426518785063257338453091474979982",
"12169908875594898466296172543692006012",
"33319128945223968264405229108715540464",
"321482318436167685971246621113479188838"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2022-50096-a104f90e",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b9c3401f7cac6ae291a16784dadcd1bf116218fe",
"target": {
"file": "arch/x86/kernel/kprobes/core.c",
"function": "kprobe_post_process"
},
"deprecated": false,
"digest": {
"function_hash": "41229282643404801239200487769206838392",
"length": 336.0
},
"signature_version": "v1"
}
]