CVE-2024-50278
Vulnerability from cvelistv5
Published
2024-11-19 01:30
Modified
2024-12-19 09:37
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: dm cache: fix potential out-of-bounds access on the first resume Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table. This happens because expanding the fast device requires reloading the cache table for cache_create to allocate new in-core data structures that fit the new size, and the check in cache_preresume is not performed during the first resume, leading to the issue. Reproduce steps: 1. prepare component devices: dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 65536 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct 2. load a cache table of 512 cache blocks, and deliberately expand the fast device before resuming the cache, making the in-core data structures inadequate. dmsetup create cache --notable dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192" dmsetup resume cdata dmsetup resume cache 3. suspend the cache to write out the in-core dirty bitset and hint array, leading to out-of-bounds access to the dirty bitset at offset 0x40: dmsetup suspend cache KASAN reports: BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80 Read of size 8 at addr ffffc90000085040 by task dmsetup/90 (...snip...) The buggy address belongs to the virtual mapping at [ffffc90000085000, ffffc90000087000) created by: cache_ctr+0x176a/0x35f0 (...snip...) Memory state around the buggy address: ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Fix by checking the size change on the first resume.
Impacted products
Vendor Product Version
Linux Linux Version: 3.13
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/dm-cache-target.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e492f71854ce03474d49e87fd98b8df1f7cd1d2d",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "2222b0929d00e2d13732b799b63be391b5de4492",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "483b7261b35a9d369082ab298a6670912243f0be",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "fdef3b94dfebd57e3077a578b6e309a2bb6fa688",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "c52ec00cb2f9bebfada22edcc0db385b910a1cdb",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "036dd6e3d2638103e0092864577ea1d091466b86",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "13ed3624c6ef283acefa4cc42cc8ae54fd4391a4",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            },
            {
              "lessThan": "c0ade5d98979585d4f5a93e4514c2e9a65afa08d",
              "status": "affected",
              "version": "f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/md/dm-cache-target.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.13"
            },
            {
              "lessThan": "3.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.324",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.286",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.230",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.172",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.117",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.61",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix potential out-of-bounds access on the first resume\n\nOut-of-bounds access occurs if the fast device is expanded unexpectedly\nbefore the first-time resume of the cache table. This happens because\nexpanding the fast device requires reloading the cache table for\ncache_create to allocate new in-core data structures that fit the new\nsize, and the check in cache_preresume is not performed during the\nfirst resume, leading to the issue.\n\nReproduce steps:\n\n1. prepare component devices:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\n\n2. load a cache table of 512 cache blocks, and deliberately expand the\n   fast device before resuming the cache, making the in-core data\n   structures inadequate.\n\ndmsetup create cache --notable\ndmsetup reload cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\ndmsetup reload cdata --table \"0 131072 linear /dev/sdc 8192\"\ndmsetup resume cdata\ndmsetup resume cache\n\n3. suspend the cache to write out the in-core dirty bitset and hint\n   array, leading to out-of-bounds access to the dirty bitset at offset\n   0x40:\n\ndmsetup suspend cache\n\nKASAN reports:\n\n  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80\n  Read of size 8 at addr ffffc90000085040 by task dmsetup/90\n\n  (...snip...)\n  The buggy address belongs to the virtual mapping at\n   [ffffc90000085000, ffffc90000087000) created by:\n   cache_ctr+0x176a/0x35f0\n\n  (...snip...)\n  Memory state around the buggy address:\n   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n  \u003effffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8\n                                             ^\n   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n\nFix by checking the size change on the first resume."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:37:09.903Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e492f71854ce03474d49e87fd98b8df1f7cd1d2d"
        },
        {
          "url": "https://git.kernel.org/stable/c/2222b0929d00e2d13732b799b63be391b5de4492"
        },
        {
          "url": "https://git.kernel.org/stable/c/483b7261b35a9d369082ab298a6670912243f0be"
        },
        {
          "url": "https://git.kernel.org/stable/c/fdef3b94dfebd57e3077a578b6e309a2bb6fa688"
        },
        {
          "url": "https://git.kernel.org/stable/c/c52ec00cb2f9bebfada22edcc0db385b910a1cdb"
        },
        {
          "url": "https://git.kernel.org/stable/c/036dd6e3d2638103e0092864577ea1d091466b86"
        },
        {
          "url": "https://git.kernel.org/stable/c/13ed3624c6ef283acefa4cc42cc8ae54fd4391a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/c0ade5d98979585d4f5a93e4514c2e9a65afa08d"
        }
      ],
      "title": "dm cache: fix potential out-of-bounds access on the first resume",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-50278",
    "datePublished": "2024-11-19T01:30:19.352Z",
    "dateReserved": "2024-10-21T19:36:19.983Z",
    "dateUpdated": "2024-12-19T09:37:09.903Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-50278\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-19T02:16:30.113\",\"lastModified\":\"2024-11-27T16:00:23.223\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndm cache: fix potential out-of-bounds access on the first resume\\n\\nOut-of-bounds access occurs if the fast device is expanded unexpectedly\\nbefore the first-time resume of the cache table. This happens because\\nexpanding the fast device requires reloading the cache table for\\ncache_create to allocate new in-core data structures that fit the new\\nsize, and the check in cache_preresume is not performed during the\\nfirst resume, leading to the issue.\\n\\nReproduce steps:\\n\\n1. prepare component devices:\\n\\ndmsetup create cmeta --table \\\"0 8192 linear /dev/sdc 0\\\"\\ndmsetup create cdata --table \\\"0 65536 linear /dev/sdc 8192\\\"\\ndmsetup create corig --table \\\"0 524288 linear /dev/sdc 262144\\\"\\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\\n\\n2. load a cache table of 512 cache blocks, and deliberately expand the\\n   fast device before resuming the cache, making the in-core data\\n   structures inadequate.\\n\\ndmsetup create cache --notable\\ndmsetup reload cache --table \\\"0 524288 cache /dev/mapper/cmeta \\\\\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\\\"\\ndmsetup reload cdata --table \\\"0 131072 linear /dev/sdc 8192\\\"\\ndmsetup resume cdata\\ndmsetup resume cache\\n\\n3. suspend the cache to write out the in-core dirty bitset and hint\\n   array, leading to out-of-bounds access to the dirty bitset at offset\\n   0x40:\\n\\ndmsetup suspend cache\\n\\nKASAN reports:\\n\\n  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80\\n  Read of size 8 at addr ffffc90000085040 by task dmsetup/90\\n\\n  (...snip...)\\n  The buggy address belongs to the virtual mapping at\\n   [ffffc90000085000, ffffc90000087000) created by:\\n   cache_ctr+0x176a/0x35f0\\n\\n  (...snip...)\\n  Memory state around the buggy address:\\n   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\\n   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\\n  \u003effffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8\\n                                             ^\\n   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\\n   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\\n\\nFix by checking the size change on the first resume.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm cache: fix potential out-of-limits access on the first resume El acceso fuera de los l\u00edmites ocurre si el dispositivo r\u00e1pido se expande inesperadamente antes de la primera reanudaci\u00f3n de la tabla de cach\u00e9. Esto sucede porque expandir el dispositivo r\u00e1pido requiere volver a cargar la tabla de cach\u00e9 para que cache_create asigne nuevas estructuras de datos en el n\u00facleo que se ajusten al nuevo tama\u00f1o, y la verificaci\u00f3n en cache_preresume no se realiza durante la primera reanudaci\u00f3n, lo que genera el problema. Reproducir pasos: 1. preparar los dispositivos componentes: dmsetup create cmeta --table \\\"0 8192 linear /dev/sdc 0\\\" dmsetup create cdata --table \\\"0 65536 linear /dev/sdc 8192\\\" dmsetup create corig --table \\\"0 524288 linear /dev/sdc 262144\\\" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct 2. cargar una tabla de cach\u00e9 de 512 bloques de cach\u00e9 y expandir deliberadamente el dispositivo r\u00e1pido antes de reanudar el cach\u00e9, lo que hace que las estructuras de datos en el n\u00facleo sean inadecuadas. dmsetup create cache --notable dmsetup reload cache --table \\\"0 524288 cache /dev/mapper/cmeta \\\\ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\\\" dmsetup reload cdata --table \\\"0 131072 linear /dev/sdc 8192\\\" dmsetup resume cdata dmsetup resume cache 3. suspende la cach\u00e9 para escribir el conjunto de bits sucios en el n\u00facleo y la matriz de sugerencias, lo que genera un acceso fuera de los l\u00edmites al conjunto de bits sucios en el desplazamiento 0x40: dmsetup suspend cache KASAN informa: ERROR: KASAN: vmalloc-out-of-bounds en is_dirty_callback+0x2b/0x80 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffffc90000085040 por la tarea dmsetup/90 (...snip...) La direcci\u00f3n con errores pertenece al mapeo virtual en [ffffc90000085000, ffffc90000087000) creado por: cache_ctr+0x176a/0x35f0 (...snip...) Estado de la memoria alrededor de la direcci\u00f3n con errores: ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 \u0026gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc90000085080: f8 ...\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"4.19.324\",\"matchCriteriaId\":\"6F34367D-A869-4C97-A01F-F5209F24FC10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.286\",\"matchCriteriaId\":\"9952C897-8A61-4D4B-9D6D-7D063E9EA15E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.230\",\"matchCriteriaId\":\"BF5B32D0-72C9-41C3-A0BB-D4946153C134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.172\",\"matchCriteriaId\":\"88812664-4296-42AC-AE0F-ED71086C1BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.117\",\"matchCriteriaId\":\"0DD7F755-2F6B-4707-8973-78496AD5AA8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.61\",\"matchCriteriaId\":\"630ED7EB-C97E-4435-B884-1E309E40D6F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.11.8\",\"matchCriteriaId\":\"0BD000F7-3DAD-4DD3-8906-98EA1EC67E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C95E234-D335-4B6C-96BF-E2CEBD8654ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F717D8-3014-4F84-8086-0124B2111379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DBE6C7-2AAE-4818-AED2-E131F153D2FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B88717-53F5-42AA-9B72-14C707639E3F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/036dd6e3d2638103e0092864577ea1d091466b86\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/13ed3624c6ef283acefa4cc42cc8ae54fd4391a4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2222b0929d00e2d13732b799b63be391b5de4492\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/483b7261b35a9d369082ab298a6670912243f0be\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c0ade5d98979585d4f5a93e4514c2e9a65afa08d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c52ec00cb2f9bebfada22edcc0db385b910a1cdb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e492f71854ce03474d49e87fd98b8df1f7cd1d2d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fdef3b94dfebd57e3077a578b6e309a2bb6fa688\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.