CVE-2024-50099

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50099
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50099.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50099
Downstream
Related
Published
2024-11-05T17:07:37Z
Modified
2025-10-22T05:20:28.116095Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
arm64: probes: Remove broken LDR (literal) uprobe support
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Remove broken LDR (literal) uprobe support

The simulateldrliteral() and simulateldrswliteral() functions are unsafe to use for uprobes. Both functions were originally written for use with kprobes, and access memory with plain C accesses. When uprobes was added, these were reused unmodified even though they cannot safely access user memory.

There are three key problems:

1) The plain C accesses do not have corresponding extable entries, and thus if they encounter a fault the kernel will treat these as unintentional accesses to user memory, resulting in a BUG() which will kill the kernel thread, and likely lead to further issues (e.g. lockup or panic()).

2) The plain C accesses are subject to HW PAN and SW PAN, and so when either is in use, any attempt to simulate an access to user memory will fault. Thus neither simulateldrliteral() nor simulateldrswliteral() can do anything useful when simulating a user instruction on any system with HW PAN or SW PAN.

3) The plain C accesses are privileged, as they run in kernel context, and in practice can access a small range of kernel virtual addresses. The instructions they simulate have a range of +/-1MiB, and since the simulated instructions must itself be a user instructions in the TTBR0 address range, these can address the final 1MiB of the TTBR1 acddress range by wrapping downwards from an address in the first 1MiB of the TTBR0 address range.

In contemporary kernels the last 8MiB of TTBR1 address range is reserved, and accesses to this will always fault, meaning this is no worse than (1).

Historically, it was theoretically possible for the linear map or vmemmap to spill into the final 8MiB of the TTBR1 address range, but in practice this is extremely unlikely to occur as this would require either:

  • Having enough physical memory to fill the entire linear map all the way to the final 1MiB of the TTBR1 address range.

  • Getting unlucky with KASLR randomization of the linear map such that the populated region happens to overlap with the last 1MiB of the TTBR address range.

    ... and in either case if we were to spill into the final page there would be larger problems as the final page would alias with error pointers.

Practically speaking, (1) and (2) are the big issues. Given there have been no reports of problems since the broken code was introduced, it appears that no-one is relying on probing these instructions with uprobes.

Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW (literal), limiting the use of simulateldrliteral() and simulateldrswliteral() to kprobes. Attempts to place uprobes on LDR (literal) and LDRSW (literal) will be rejected as armprobedecodeinsn() will return INSNREJECTED. In future we can consider introducing working uprobes support for these instructions, but this will require more significant work.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
cc86f2e9876c8b5300238cec6bf0bd8c842078ee
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
3728b4eb27910ffedd173018279a970705f2e03a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
ad4bc35a6d22e9ff9b67d0d0c38bce654232f195
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
bae792617a7e911477f67a3aff850ad4ddf51572
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
9f1e7735474e7457a4d919a517900e46868ae5f6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
20cde998315a3d2df08e26079a3ea7501abce6db
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9842ceae9fa8deae141533d52a6ead7666962c09
Fixed
acc450aa07099d071b18174c22a1119c57da8227

Affected versions

v4.*

v4.10
v4.10-rc1
v4.10-rc2
v4.10-rc3
v4.10-rc4
v4.10-rc5
v4.10-rc6
v4.10-rc7
v4.10-rc8
v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.19.1
v4.19.10
v4.19.100
v4.19.101
v4.19.102
v4.19.103
v4.19.104
v4.19.105
v4.19.106
v4.19.107
v4.19.108
v4.19.109
v4.19.11
v4.19.110
v4.19.111
v4.19.112
v4.19.113
v4.19.114
v4.19.115
v4.19.116
v4.19.117
v4.19.118
v4.19.119
v4.19.12
v4.19.120
v4.19.121
v4.19.122
v4.19.123
v4.19.124
v4.19.125
v4.19.126
v4.19.127
v4.19.128
v4.19.129
v4.19.13
v4.19.130
v4.19.131
v4.19.132
v4.19.133
v4.19.134
v4.19.135
v4.19.136
v4.19.137
v4.19.138
v4.19.139
v4.19.14
v4.19.140
v4.19.141
v4.19.142
v4.19.143
v4.19.144
v4.19.145
v4.19.146
v4.19.147
v4.19.148
v4.19.149
v4.19.15
v4.19.150
v4.19.151
v4.19.152
v4.19.153
v4.19.154
v4.19.155
v4.19.156
v4.19.157
v4.19.158
v4.19.159
v4.19.16
v4.19.160
v4.19.161
v4.19.162
v4.19.163
v4.19.164
v4.19.165
v4.19.166
v4.19.167
v4.19.168
v4.19.169
v4.19.17
v4.19.170
v4.19.171
v4.19.172
v4.19.173
v4.19.174
v4.19.175
v4.19.176
v4.19.177
v4.19.178
v4.19.179
v4.19.18
v4.19.180
v4.19.181
v4.19.182
v4.19.183
v4.19.184
v4.19.185
v4.19.186
v4.19.187
v4.19.188
v4.19.189
v4.19.19
v4.19.190
v4.19.191
v4.19.192
v4.19.193
v4.19.194
v4.19.195
v4.19.196
v4.19.197
v4.19.198
v4.19.199
v4.19.2
v4.19.20
v4.19.200
v4.19.201
v4.19.202
v4.19.203
v4.19.204
v4.19.205
v4.19.206
v4.19.207
v4.19.208
v4.19.209
v4.19.21
v4.19.210
v4.19.211
v4.19.212
v4.19.213
v4.19.214
v4.19.215
v4.19.216
v4.19.217
v4.19.218
v4.19.219
v4.19.22
v4.19.220
v4.19.221
v4.19.222
v4.19.223
v4.19.224
v4.19.225
v4.19.226
v4.19.227
v4.19.228
v4.19.229
v4.19.23
v4.19.230
v4.19.231
v4.19.232
v4.19.233
v4.19.234
v4.19.235
v4.19.236
v4.19.237
v4.19.238
v4.19.239
v4.19.24
v4.19.240
v4.19.241
v4.19.242
v4.19.243
v4.19.244
v4.19.245
v4.19.246
v4.19.247
v4.19.248
v4.19.249
v4.19.25
v4.19.250
v4.19.251
v4.19.252
v4.19.253
v4.19.254
v4.19.255
v4.19.256
v4.19.257
v4.19.258
v4.19.259
v4.19.26
v4.19.260
v4.19.261
v4.19.262
v4.19.263
v4.19.264
v4.19.265
v4.19.266
v4.19.267
v4.19.268
v4.19.269
v4.19.27
v4.19.270
v4.19.271
v4.19.272
v4.19.273
v4.19.274
v4.19.275
v4.19.276
v4.19.277
v4.19.278
v4.19.279
v4.19.28
v4.19.280
v4.19.281
v4.19.282
v4.19.283
v4.19.284
v4.19.285
v4.19.286
v4.19.287
v4.19.288
v4.19.289
v4.19.29
v4.19.290
v4.19.291
v4.19.292
v4.19.293
v4.19.294
v4.19.295
v4.19.296
v4.19.297
v4.19.298
v4.19.299
v4.19.3
v4.19.30
v4.19.300
v4.19.301
v4.19.302
v4.19.303
v4.19.304
v4.19.305
v4.19.306
v4.19.307
v4.19.308
v4.19.309
v4.19.31
v4.19.310
v4.19.311
v4.19.312
v4.19.313
v4.19.314
v4.19.315
v4.19.316
v4.19.317
v4.19.318
v4.19.319
v4.19.32
v4.19.320
v4.19.321
v4.19.322
v4.19.33
v4.19.34
v4.19.35
v4.19.36
v4.19.37
v4.19.38
v4.19.39
v4.19.4
v4.19.40
v4.19.41
v4.19.42
v4.19.43
v4.19.44
v4.19.45
v4.19.46
v4.19.47
v4.19.48
v4.19.49
v4.19.5
v4.19.50
v4.19.51
v4.19.52
v4.19.53
v4.19.54
v4.19.55
v4.19.56
v4.19.57
v4.19.58
v4.19.59
v4.19.6
v4.19.60
v4.19.61
v4.19.62
v4.19.63
v4.19.64
v4.19.65
v4.19.66
v4.19.67
v4.19.68
v4.19.69
v4.19.7
v4.19.70
v4.19.71
v4.19.72
v4.19.73
v4.19.74
v4.19.75
v4.19.76
v4.19.77
v4.19.78
v4.19.79
v4.19.8
v4.19.80
v4.19.81
v4.19.82
v4.19.83
v4.19.84
v4.19.85
v4.19.86
v4.19.87
v4.19.88
v4.19.89
v4.19.9
v4.19.90
v4.19.91
v4.19.92
v4.19.93
v4.19.94
v4.19.95
v4.19.96
v4.19.97
v4.19.98
v4.19.99
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7
v4.9
v4.9-rc5
v4.9-rc6
v4.9-rc7
v4.9-rc8

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.100
v5.10.101
v5.10.102
v5.10.103
v5.10.104
v5.10.105
v5.10.106
v5.10.107
v5.10.108
v5.10.109
v5.10.11
v5.10.110
v5.10.111
v5.10.112
v5.10.113
v5.10.114
v5.10.115
v5.10.116
v5.10.117
v5.10.118
v5.10.119
v5.10.12
v5.10.120
v5.10.121
v5.10.122
v5.10.123
v5.10.124
v5.10.125
v5.10.126
v5.10.127
v5.10.128
v5.10.129
v5.10.13
v5.10.130
v5.10.131
v5.10.132
v5.10.133
v5.10.134
v5.10.135
v5.10.136
v5.10.137
v5.10.138
v5.10.139
v5.10.14
v5.10.140
v5.10.141
v5.10.142
v5.10.143
v5.10.144
v5.10.145
v5.10.146
v5.10.147
v5.10.148
v5.10.149
v5.10.15
v5.10.150
v5.10.151
v5.10.152
v5.10.153
v5.10.154
v5.10.155
v5.10.156
v5.10.157
v5.10.158
v5.10.159
v5.10.16
v5.10.160
v5.10.161
v5.10.162
v5.10.163
v5.10.164
v5.10.165
v5.10.166
v5.10.167
v5.10.168
v5.10.169
v5.10.17
v5.10.170
v5.10.171
v5.10.172
v5.10.173
v5.10.174
v5.10.175
v5.10.176
v5.10.177
v5.10.178
v5.10.179
v5.10.18
v5.10.180
v5.10.181
v5.10.182
v5.10.183
v5.10.184
v5.10.185
v5.10.186
v5.10.187
v5.10.188
v5.10.189
v5.10.19
v5.10.190
v5.10.191
v5.10.192
v5.10.193
v5.10.194
v5.10.195
v5.10.196
v5.10.197
v5.10.198
v5.10.199
v5.10.2
v5.10.20
v5.10.200
v5.10.201
v5.10.202
v5.10.203
v5.10.204
v5.10.205
v5.10.206
v5.10.207
v5.10.208
v5.10.209
v5.10.21
v5.10.210
v5.10.211
v5.10.212
v5.10.213
v5.10.214
v5.10.215
v5.10.216
v5.10.217
v5.10.218
v5.10.219
v5.10.22
v5.10.220
v5.10.221
v5.10.222
v5.10.223
v5.10.224
v5.10.225
v5.10.226
v5.10.227
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.100
v5.15.101
v5.15.102
v5.15.103
v5.15.104
v5.15.105
v5.15.106
v5.15.107
v5.15.108
v5.15.109
v5.15.11
v5.15.110
v5.15.111
v5.15.112
v5.15.113
v5.15.114
v5.15.115
v5.15.116
v5.15.117
v5.15.118
v5.15.119
v5.15.12
v5.15.120
v5.15.121
v5.15.122
v5.15.123
v5.15.124
v5.15.125
v5.15.126
v5.15.127
v5.15.128
v5.15.129
v5.15.13
v5.15.130
v5.15.131
v5.15.132
v5.15.133
v5.15.134
v5.15.135
v5.15.136
v5.15.137
v5.15.138
v5.15.139
v5.15.14
v5.15.140
v5.15.141
v5.15.142
v5.15.143
v5.15.144
v5.15.145
v5.15.146
v5.15.147
v5.15.148
v5.15.149
v5.15.15
v5.15.150
v5.15.151
v5.15.152
v5.15.153
v5.15.154
v5.15.155
v5.15.156
v5.15.157
v5.15.158
v5.15.159
v5.15.16
v5.15.160
v5.15.161
v5.15.162
v5.15.163
v5.15.164
v5.15.165
v5.15.166
v5.15.167
v5.15.168
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.15.87
v5.15.88
v5.15.89
v5.15.9
v5.15.90
v5.15.91
v5.15.92
v5.15.93
v5.15.94
v5.15.95
v5.15.96
v5.15.97
v5.15.98
v5.15.99
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.4.1
v5.4.10
v5.4.100
v5.4.101
v5.4.102
v5.4.103
v5.4.104
v5.4.105
v5.4.106
v5.4.107
v5.4.108
v5.4.109
v5.4.11
v5.4.110
v5.4.111
v5.4.112
v5.4.113
v5.4.114
v5.4.115
v5.4.116
v5.4.117
v5.4.118
v5.4.119
v5.4.12
v5.4.120
v5.4.121
v5.4.122
v5.4.123
v5.4.124
v5.4.125
v5.4.126
v5.4.127
v5.4.128
v5.4.129
v5.4.13
v5.4.130
v5.4.131
v5.4.132
v5.4.133
v5.4.134
v5.4.135
v5.4.136
v5.4.137
v5.4.138
v5.4.139
v5.4.14
v5.4.140
v5.4.141
v5.4.142
v5.4.143
v5.4.144
v5.4.145
v5.4.146
v5.4.147
v5.4.148
v5.4.149
v5.4.15
v5.4.150
v5.4.151
v5.4.152
v5.4.153
v5.4.154
v5.4.155
v5.4.156
v5.4.157
v5.4.158
v5.4.159
v5.4.16
v5.4.160
v5.4.161
v5.4.162
v5.4.163
v5.4.164
v5.4.165
v5.4.166
v5.4.167
v5.4.168
v5.4.169
v5.4.17
v5.4.170
v5.4.171
v5.4.172
v5.4.173
v5.4.174
v5.4.175
v5.4.176
v5.4.177
v5.4.178
v5.4.179
v5.4.18
v5.4.180
v5.4.181
v5.4.182
v5.4.183
v5.4.184
v5.4.185
v5.4.186
v5.4.187
v5.4.188
v5.4.189
v5.4.19
v5.4.190
v5.4.191
v5.4.192
v5.4.193
v5.4.194
v5.4.195
v5.4.196
v5.4.197
v5.4.198
v5.4.199
v5.4.2
v5.4.20
v5.4.200
v5.4.201
v5.4.202
v5.4.203
v5.4.204
v5.4.205
v5.4.206
v5.4.207
v5.4.208
v5.4.209
v5.4.21
v5.4.210
v5.4.211
v5.4.212
v5.4.213
v5.4.214
v5.4.215
v5.4.216
v5.4.217
v5.4.218
v5.4.219
v5.4.22
v5.4.220
v5.4.221
v5.4.222
v5.4.223
v5.4.224
v5.4.225
v5.4.226
v5.4.227
v5.4.228
v5.4.229
v5.4.23
v5.4.230
v5.4.231
v5.4.232
v5.4.233
v5.4.234
v5.4.235
v5.4.236
v5.4.237
v5.4.238
v5.4.239
v5.4.24
v5.4.240
v5.4.241
v5.4.242
v5.4.243
v5.4.244
v5.4.245
v5.4.246
v5.4.247
v5.4.248
v5.4.249
v5.4.25
v5.4.250
v5.4.251
v5.4.252
v5.4.253
v5.4.254
v5.4.255
v5.4.256
v5.4.257
v5.4.258
v5.4.259
v5.4.26
v5.4.260
v5.4.261
v5.4.262
v5.4.263
v5.4.264
v5.4.265
v5.4.266
v5.4.267
v5.4.268
v5.4.269
v5.4.27
v5.4.270
v5.4.271
v5.4.272
v5.4.273
v5.4.274
v5.4.275
v5.4.276
v5.4.277
v5.4.278
v5.4.279
v5.4.28
v5.4.280
v5.4.281
v5.4.282
v5.4.283
v5.4.284
v5.4.29
v5.4.3
v5.4.30
v5.4.31
v5.4.32
v5.4.33
v5.4.34
v5.4.35
v5.4.36
v5.4.37
v5.4.38
v5.4.39
v5.4.4
v5.4.40
v5.4.41
v5.4.42
v5.4.43
v5.4.44
v5.4.45
v5.4.46
v5.4.47
v5.4.48
v5.4.49
v5.4.5
v5.4.50
v5.4.51
v5.4.52
v5.4.53
v5.4.54
v5.4.55
v5.4.56
v5.4.57
v5.4.58
v5.4.59
v5.4.6
v5.4.60
v5.4.61
v5.4.62
v5.4.63
v5.4.64
v5.4.65
v5.4.66
v5.4.67
v5.4.68
v5.4.69
v5.4.7
v5.4.70
v5.4.71
v5.4.72
v5.4.73
v5.4.74
v5.4.75
v5.4.76
v5.4.77
v5.4.78
v5.4.79
v5.4.8
v5.4.80
v5.4.81
v5.4.82
v5.4.83
v5.4.84
v5.4.85
v5.4.86
v5.4.87
v5.4.88
v5.4.89
v5.4.9
v5.4.90
v5.4.91
v5.4.92
v5.4.93
v5.4.94
v5.4.95
v5.4.96
v5.4.97
v5.4.98
v5.4.99
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.100
v6.1.101
v6.1.102
v6.1.103
v6.1.104
v6.1.105
v6.1.106
v6.1.107
v6.1.108
v6.1.109
v6.1.11
v6.1.110
v6.1.111
v6.1.112
v6.1.113
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.12-rc1
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.57
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bae792617a7e911477f67a3aff850ad4ddf51572",
        "id": "CVE-2024-50099-06b7d5df",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@acc450aa07099d071b18174c22a1119c57da8227",
        "id": "CVE-2024-50099-10a5c0c8",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f1e7735474e7457a4d919a517900e46868ae5f6",
        "id": "CVE-2024-50099-1440f9df",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@acc450aa07099d071b18174c22a1119c57da8227",
        "id": "CVE-2024-50099-20a3a8cf",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bae792617a7e911477f67a3aff850ad4ddf51572",
        "id": "CVE-2024-50099-2d3aeb4e",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
        "id": "CVE-2024-50099-300d2c3a",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@20cde998315a3d2df08e26079a3ea7501abce6db",
        "id": "CVE-2024-50099-370f11bb",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
        "id": "CVE-2024-50099-3802837e",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
        "id": "CVE-2024-50099-4a702b21",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bae792617a7e911477f67a3aff850ad4ddf51572",
        "id": "CVE-2024-50099-4b1f44db",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
        "id": "CVE-2024-50099-5a84b7a0",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3728b4eb27910ffedd173018279a970705f2e03a",
        "id": "CVE-2024-50099-5e245254",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
        "id": "CVE-2024-50099-5ec52f16",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
        "id": "CVE-2024-50099-68e68b3e",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@20cde998315a3d2df08e26079a3ea7501abce6db",
        "id": "CVE-2024-50099-8a234519",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@acc450aa07099d071b18174c22a1119c57da8227",
        "id": "CVE-2024-50099-91c3d1cc",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3728b4eb27910ffedd173018279a970705f2e03a",
        "id": "CVE-2024-50099-94e54162",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f1e7735474e7457a4d919a517900e46868ae5f6",
        "id": "CVE-2024-50099-a48b110e",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@20cde998315a3d2df08e26079a3ea7501abce6db",
        "id": "CVE-2024-50099-a8a52789",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
        "id": "CVE-2024-50099-c4c3eddb",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "6550025407896635967514032591528830833",
                "281034489104937433844982106701466631978",
                "25339441014330624362952725052257503992",
                "244406825326816790079425862312579817458",
                "176529383978747053026340739445295338191",
                "165662616811306128450796278832696214312",
                "17080681110493689773249216365397060056",
                "296762397096487070297518346417189961845",
                "149629765271512744844367384345152174257",
                "41572454983529838171592657708762525853",
                "182529459829783971994158817449735915251",
                "49261843983813396949076217247520386118",
                "112461932896294837048957454179316032096",
                "187982961783113885675638501742368989668",
                "107332669676501111595981506922398073063"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f1e7735474e7457a4d919a517900e46868ae5f6",
        "id": "CVE-2024-50099-c80f3323",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
        "id": "CVE-2024-50099-ce541e6b",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_kprobe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 517.0,
            "function_hash": "5676919315420707007970901229010512120"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3728b4eb27910ffedd173018279a970705f2e03a",
        "id": "CVE-2024-50099-f51a3420",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
        "id": "CVE-2024-50099-f6044000",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "arm_probe_decode_insn",
            "file": "arch/arm64/kernel/probes/decode-insn.c"
        },
        "signature_type": "Function",
        "digest": {
            "length": 855.0,
            "function_hash": "215223063659113555772798494720695094897"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.19.323
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.285
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.228
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.169
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.114
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.58
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.5