cve-2023-52578
Vulnerability from cvelistv5
Published
2024-03-02 21:59
Modified
2024-11-04 14:49
Severity ?
Summary
net: bridge: use DEV_STATS_INC()
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfdPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00faPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfdPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00faPatch
Impacted products
Vendor Product Version
Linux Linux Version: 2.6.17
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52578",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T19:38:46.923888Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:22:50.080Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:03:21.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/br_forward.c",
            "net/bridge/br_input.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d2346e6beb69",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "ad8d39c7b437",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "04cc361f029c",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "8bc97117b51d",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "89f9f20b1cbd",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "f2ef4cb4d418",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            },
            {
              "lessThan": "44bdb313da57",
              "status": "affected",
              "version": "1c29fc4989bc",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/bridge/br_forward.c",
            "net/bridge/br_input.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.17"
            },
            {
              "lessThan": "2.6.17",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.296",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.258",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.198",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.134",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.56",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: use DEV_STATS_INC()\n\nsyzbot/KCSAN reported data-races in br_handle_frame_finish() [1]\nThis function can run from multiple cpus without mutual exclusion.\n\nAdopt SMP safe DEV_STATS_INC() to update dev-\u003estats fields.\n\nHandles updates to dev-\u003estats.tx_dropped while we are at it.\n\n[1]\nBUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\nrun_ksoftirqd+0x17/0x20 kernel/softirq.c:921\nsmpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\ndo_softirq+0x5e/0x90 kernel/softirq.c:454\n__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\nspin_unlock_bh include/linux/spinlock.h:396 [inline]\nbatadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356\nbatadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560\nprocess_one_work kernel/workqueue.c:2630 [inline]\nprocess_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703\nworker_thread+0x525/0x730 kernel/workqueue.c:2784\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nvalue changed: 0x00000000000d7190 -\u003e 0x00000000000d7191\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T14:49:05.309Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839"
        },
        {
          "url": "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5"
        },
        {
          "url": "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd"
        },
        {
          "url": "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394"
        },
        {
          "url": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2"
        },
        {
          "url": "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa"
        },
        {
          "url": "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4"
        }
      ],
      "title": "net: bridge: use DEV_STATS_INC()",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52578",
    "datePublished": "2024-03-02T21:59:45.921Z",
    "dateReserved": "2024-03-02T21:55:42.569Z",
    "dateUpdated": "2024-11-04T14:49:05.309Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52578\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-02T22:15:49.583\",\"lastModified\":\"2024-12-11T17:44:23.533\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: bridge: use DEV_STATS_INC()\\n\\nsyzbot/KCSAN reported data-races in br_handle_frame_finish() [1]\\nThis function can run from multiple cpus without mutual exclusion.\\n\\nAdopt SMP safe DEV_STATS_INC() to update dev-\u003estats fields.\\n\\nHandles updates to dev-\u003estats.tx_dropped while we are at it.\\n\\n[1]\\nBUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish\\n\\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:\\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\\nbr_nf_hook_thresh+0x1ed/0x220\\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\\nNF_HOOK include/linux/netfilter.h:304 [inline]\\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\\nnapi_poll net/core/dev.c:6594 [inline]\\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\\nrun_ksoftirqd+0x17/0x20 kernel/softirq.c:921\\nsmpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164\\nkthread+0x1d7/0x210 kernel/kthread.c:388\\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\\n\\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:\\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\\nbr_nf_hook_thresh+0x1ed/0x220\\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\\nNF_HOOK include/linux/netfilter.h:304 [inline]\\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\\nnapi_poll net/core/dev.c:6594 [inline]\\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\\ndo_softirq+0x5e/0x90 kernel/softirq.c:454\\n__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\\n__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\\n_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\\nspin_unlock_bh include/linux/spinlock.h:396 [inline]\\nbatadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356\\nbatadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560\\nprocess_one_work kernel/workqueue.c:2630 [inline]\\nprocess_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703\\nworker_thread+0x525/0x730 kernel/workqueue.c:2784\\nkthread+0x1d7/0x210 kernel/kthread.c:388\\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\\n\\nvalue changed: 0x00000000000d7190 -\u003e 0x00000000000d7191\\n\\nReported by Kernel Concurrency Sanitizer on:\\nCPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: bridge: use DEV_STATS_INC() syzbot/KCSAN inform\u00f3 ejecuci\u00f3ns de datos en br_handle_frame_finish() [1] Esta funci\u00f3n se puede ejecutar desde m\u00faltiples CPU sin exclusi\u00f3n mutua. Adopte DEV_STATS_INC() seguro para SMP para actualizar los campos dev-\u0026gt;stats. Maneja las actualizaciones de dev-\u0026gt;stats.tx_dropped mientras estamos en ello. [1] ERROR: KCSAN: ejecuci\u00f3n de datos en br_handle_frame_finish / br_handle_frame_finish lectura-escritura en 0xffff8881374b2178 de 8 bytes por interrupci\u00f3n en la CPU 1: br_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x 220 br_nf_pre_routing_finish_ipv6+0x50f /0x540 NF_HOOK include/linux/netfilter.h:304 [en l\u00ednea] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hoo kfn incluye/linux/netfilter. h:144 [en l\u00ednea] nf_hook_bridge_pre net/bridge/br_input.c:272 [en l\u00ednea] br_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417 __netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417 __netif_receive_skb_one_core net / core/dev.c:5521 [en l\u00ednea] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637 Process_backlog+0x21f/0x380 net/core/dev.c:5965 __napi_poll+0x60/0x3b0 net/core/dev.c :6527 napi_poll net/core/dev.c:6594 [en l\u00ednea] net_rx_action+0x32b/0x750 net/core/dev.c:6727 __do_softirq+0xc1/0x265 kernel/softirq.c:553 run_ksoftirqd+0x17/0x20 kernel/softirq. c:921 smpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164 kthread+0x1d7/0x210 kernel/kthread.c:388 ret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/ x86/entry/entry_64.S:304 lectura-escritura en 0xffff8881374b2178 de 8 bytes por interrupci\u00f3n en la CPU 0: br_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189 br_nf_hook_thresh+0x1ed/0x220 br_nf_pre_routing_finish_ ipv6+0x50f/0x540 NF_HOOK incluye/ linux/netfilter.h:304 [en l\u00ednea] br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178 br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter. h:144 [en l\u00ednea ] nf_hook_bridge_pre net/bridge/br_input.c: 272 [inline] br_handle_frame+0x4c9/0x940 net/bridge/br_input.c: 417 __netif_receive_skb_core+0xa8a/0x21e0 net/cors/dev.c: 5417 __netife_skbore dev.c :5521 [en l\u00ednea] __netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637 Process_backlog+0x21f/0x380 net/core/dev.c:5965 __napi_poll+0x60/0x3b0 net/core/dev.c:6527 napi_poll net/ core/dev.c:6594 [en l\u00ednea] net_rx_action+0x32b/0x750 net/core/dev.c:6727 __do_softirq+0xc1/0x265 kernel/softirq.c:553 do_softirq+0x5e/0x90 kernel/softirq.c:454 __local_bh_enable_ip+ 0x64/0x70 kernel/softirq.c:381 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [en l\u00ednea] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [en l\u00ednea] batadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356 batadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560 Process_one_work kernel/workqueue.c:2630 [en l\u00ednea] Process_scheduled_works+0x5b8 /0xa30 kernel/workqueue.c:2703 trabajador_thread+0x525/0x730 kernel/workqueue.c:2784 kthread+0x1d7/0x210 kernel/kthread.c:388 ret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm +0x11/0x20 arch/x86/entry/entry_64.S:304 valor cambiado: 0x00000000000d7190 -\u0026gt; 0x00000000000d7191 Reportado por Kernel Concurrency Sanitizer en: CPU: 0 PID: 14848 Comm: kworker/u4:11 No contaminado 6.6.0-rc1 - syzkaller-00236-gad8a69f361b9 #0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.17\",\"versionEndExcluding\":\"4.19.296\",\"matchCriteriaId\":\"2898EF06-120F-42F5-BB0D-938C733A2E1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.258\",\"matchCriteriaId\":\"1208C905-CEAA-49F2-B357-72A5185B2656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.198\",\"matchCriteriaId\":\"66D916C3-4087-44FF-9CD9-D2826BCC9E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.134\",\"matchCriteriaId\":\"346A7B1E-5048-460C-9640-5EFA2075158B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.56\",\"matchCriteriaId\":\"5EA89569-DD45-4A69-BB4D-8356FA9386BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.5.6\",\"matchCriteriaId\":\"870FC772-173A-4A0F-B1AF-7976AD6057D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84267A4F-DBC2-444F-B41D-69E15E1BEC97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB440208-241C-4246-9A83-C1715C0DAA6C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.