In the Linux kernel, the following vulnerability has been resolved:
x86/kprobes: Update kcb status flag after singlestepping
Fix kprobes to update kcb (kprobes control block) status flag to KPROBE_HIT_SSDONE even if the kp->post_handler is not set.
This bug may cause a kernel panic if another INT3 user runs right after kprobes because kprobe_int3_handler() misunderstands the INT3 is kprobe's single stepping INT3.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.13 | 5.15.61 |
| linux / linux_kernel | 5.16 | 5.18.18 |
| linux / linux_kernel | 5.19 | 5.19.2 |