CVE-2023-52977 (GCVE-0-2023-52977)
Vulnerability from cvelistv5
Published
2025-03-27 16:43
Modified
2025-05-04 12:49
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new Syzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is not freed when an allocation of a key fails. BUG: memory leak unreferenced object 0xffff888116668000 (size 632): comm "syz-executor231", pid 1090, jiffies 4294844701 (age 18.871s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000defa3494>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<00000000defa3494>] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77 [<00000000c67d8873>] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957 [<0000000010a539a8>] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739 [<00000000dff3302d>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] [<00000000dff3302d>] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800 [<000000000286dd87>] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515 [<0000000061fed410>] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009dc0f111>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] [<000000009dc0f111>] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339 [<000000004a5ee816>] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934 [<00000000482b476f>] sock_sendmsg_nosec net/socket.c:651 [inline] [<00000000482b476f>] sock_sendmsg+0x152/0x190 net/socket.c:671 [<00000000698574ba>] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356 [<00000000d28d9e11>] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410 [<0000000083ba9120>] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439 [<00000000c00628f8>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46 [<000000004abfdcf4>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 To fix this the patch rearranges the goto labels to reflect the order of object allocations and adds appropriate goto statements on the error paths. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Impacted products
Vendor Product Version
Linux Linux Version: 655e873bf528f0f46ce6b069f9a2daee9621197c
Version: ee27d70556a47c3a07e65a60f47e3ea12a255af8
Version: 8b74211bf60b3e0c0ed4fe3d16c92ffdcaaf34eb
Version: 6736b61ecf230dd656464de0f514bdeadb384f20
Version: 0133615a06007684df648feb9d327714e399afd4
Version: 32d5fa5bdccec2361fc6c4ed05a7367155b3a1e9
Version: 68bb10101e6b0a6bb44e9c908ef795fc4af99eae
Version: 4f592e712ea2132f511d545954867d7880df5be2
Version: a991a411c3e21ef22507400dbb179ae02029d42c
Create a notification for this product.
   Linux Linux Version: 4.14.303   
Version: 4.19.270   
Version: 5.4.229   
Version: 5.10.163   
Version: 5.15.86   
Version: 6.1.2   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/openvswitch/datapath.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1ac653cf886cdfc082708c82dc6ac6115cebd2ee",
              "status": "affected",
              "version": "655e873bf528f0f46ce6b069f9a2daee9621197c",
              "versionType": "git"
            },
            {
              "lessThan": "af4e720bc00a2653f7b9df21755b9978b3d7f386",
              "status": "affected",
              "version": "ee27d70556a47c3a07e65a60f47e3ea12a255af8",
              "versionType": "git"
            },
            {
              "lessThan": "ed6c5e8caf55778500202775167e8ccdb1a030cb",
              "status": "affected",
              "version": "8b74211bf60b3e0c0ed4fe3d16c92ffdcaaf34eb",
              "versionType": "git"
            },
            {
              "lessThan": "70154489f531587996f3e9d7cceeee65cff0001d",
              "status": "affected",
              "version": "6736b61ecf230dd656464de0f514bdeadb384f20",
              "versionType": "git"
            },
            {
              "lessThan": "f423c2efd51d7eb1d143c2be7eea233241d9bbbf",
              "status": "affected",
              "version": "0133615a06007684df648feb9d327714e399afd4",
              "versionType": "git"
            },
            {
              "lessThan": "70d40674a549d498bd63d5432acf46205da1534b",
              "status": "affected",
              "version": "32d5fa5bdccec2361fc6c4ed05a7367155b3a1e9",
              "versionType": "git"
            },
            {
              "lessThan": "0c598aed445eb45b0ee7ba405f7ece99ee349c30",
              "status": "affected",
              "version": "68bb10101e6b0a6bb44e9c908ef795fc4af99eae",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "4f592e712ea2132f511d545954867d7880df5be2",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "a991a411c3e21ef22507400dbb179ae02029d42c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/openvswitch/datapath.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4.14.306",
              "status": "affected",
              "version": "4.14.303",
              "versionType": "semver"
            },
            {
              "lessThan": "4.19.273",
              "status": "affected",
              "version": "4.19.270",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.232",
              "status": "affected",
              "version": "5.4.229",
              "versionType": "semver"
            },
            {
              "lessThan": "5.10.168",
              "status": "affected",
              "version": "5.10.163",
              "versionType": "semver"
            },
            {
              "lessThan": "5.15.93",
              "status": "affected",
              "version": "5.15.86",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.11",
              "status": "affected",
              "version": "6.1.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.306",
                  "versionStartIncluding": "4.14.303",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.273",
                  "versionStartIncluding": "4.19.270",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.232",
                  "versionStartIncluding": "5.4.229",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.168",
                  "versionStartIncluding": "5.10.163",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.93",
                  "versionStartIncluding": "5.15.86",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.11",
                  "versionStartIncluding": "6.1.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.337",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.0.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix flow memory leak in ovs_flow_cmd_new\n\nSyzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is\nnot freed when an allocation of a key fails.\n\nBUG: memory leak\nunreferenced object 0xffff888116668000 (size 632):\n  comm \"syz-executor231\", pid 1090, jiffies 4294844701 (age 18.871s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c00000000defa3494\u003e] kmem_cache_zalloc include/linux/slab.h:654 [inline]\n    [\u003c00000000defa3494\u003e] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77\n    [\u003c00000000c67d8873\u003e] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957\n    [\u003c0000000010a539a8\u003e] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739\n    [\u003c00000000dff3302d\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n    [\u003c00000000dff3302d\u003e] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800\n    [\u003c000000000286dd87\u003e] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515\n    [\u003c0000000061fed410\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n    [\u003c000000009dc0f111\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n    [\u003c000000009dc0f111\u003e] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339\n    [\u003c000000004a5ee816\u003e] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934\n    [\u003c00000000482b476f\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n    [\u003c00000000482b476f\u003e] sock_sendmsg+0x152/0x190 net/socket.c:671\n    [\u003c00000000698574ba\u003e] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356\n    [\u003c00000000d28d9e11\u003e] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410\n    [\u003c0000000083ba9120\u003e] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439\n    [\u003c00000000c00628f8\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n    [\u003c000000004abfdcf4\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nTo fix this the patch rearranges the goto labels to reflect the order of\nobject allocations and adds appropriate goto statements on the error\npaths.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:49:58.492Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee"
        },
        {
          "url": "https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386"
        },
        {
          "url": "https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb"
        },
        {
          "url": "https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d"
        },
        {
          "url": "https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf"
        },
        {
          "url": "https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b"
        },
        {
          "url": "https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30"
        }
      ],
      "title": "net: openvswitch: fix flow memory leak in ovs_flow_cmd_new",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52977",
    "datePublished": "2025-03-27T16:43:17.234Z",
    "dateReserved": "2025-03-27T16:40:15.738Z",
    "dateUpdated": "2025-05-04T12:49:58.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52977\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-27T17:15:44.793\",\"lastModified\":\"2025-04-15T14:49:08.120\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: openvswitch: fix flow memory leak in ovs_flow_cmd_new\\n\\nSyzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is\\nnot freed when an allocation of a key fails.\\n\\nBUG: memory leak\\nunreferenced object 0xffff888116668000 (size 632):\\n  comm \\\"syz-executor231\\\", pid 1090, jiffies 4294844701 (age 18.871s)\\n  hex dump (first 32 bytes):\\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\\n  backtrace:\\n    [\u003c00000000defa3494\u003e] kmem_cache_zalloc include/linux/slab.h:654 [inline]\\n    [\u003c00000000defa3494\u003e] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77\\n    [\u003c00000000c67d8873\u003e] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957\\n    [\u003c0000000010a539a8\u003e] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739\\n    [\u003c00000000dff3302d\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\\n    [\u003c00000000dff3302d\u003e] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800\\n    [\u003c000000000286dd87\u003e] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515\\n    [\u003c0000000061fed410\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\\n    [\u003c000000009dc0f111\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\\n    [\u003c000000009dc0f111\u003e] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339\\n    [\u003c000000004a5ee816\u003e] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934\\n    [\u003c00000000482b476f\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\\n    [\u003c00000000482b476f\u003e] sock_sendmsg+0x152/0x190 net/socket.c:671\\n    [\u003c00000000698574ba\u003e] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356\\n    [\u003c00000000d28d9e11\u003e] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410\\n    [\u003c0000000083ba9120\u003e] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439\\n    [\u003c00000000c00628f8\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\\n    [\u003c000000004abfdcf4\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\\n\\nTo fix this the patch rearranges the goto labels to reflect the order of\\nobject allocations and adds appropriate goto statements on the error\\npaths.\\n\\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: openvswitch: corrige p\u00e9rdida de memoria de flujo en ovs_flow_cmd_new Syzkaller informa una p\u00e9rdida de memoria de new_flow en ovs_flow_cmd_new() ya que no se libera cuando falla la asignaci\u00f3n de una clave. ERROR: Fuga de memoria, objeto no referenciado 0xffff888116668000 (tama\u00f1o 632): comunicaci\u00f3n \\\"syz-executor231\\\", pid 1090, jiffies 4294844701 (edad 18.871 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ seguimiento inverso: [\u0026lt;00000000defa3494\u0026gt;] kmem_cache_zalloc include/linux/slab.h:654 [en l\u00ednea] [\u0026lt;00000000defa3494\u0026gt;] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77 [\u0026lt;00000000c67d8873\u0026gt;] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957 [\u0026lt;0000000010a539a8\u0026gt;] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739 [\u0026lt;00000000dff3302d\u0026gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [en l\u00ednea] [\u0026lt;00000000dff3302d\u0026gt;] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800 [\u0026lt;000000000286dd87\u0026gt;] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515 [\u0026lt;0000000061fed410\u0026gt;] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [\u0026lt;000000009dc0f111\u0026gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [en l\u00ednea] [\u0026lt;000000009dc0f111\u0026gt;] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339 [\u0026lt;000000004a5ee816\u0026gt;] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934 [\u0026lt;00000000482b476f\u0026gt;] sock_sendmsg_nosec net/socket.c:651 [en l\u00ednea] [\u0026lt;00000000482b476f\u0026gt;] sock_sendmsg+0x152/0x190 net/socket.c:671 [\u0026lt;00000000698574ba\u0026gt;] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356 [\u0026lt;00000000d28d9e11\u0026gt;] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410 [\u0026lt;0000000083ba9120\u0026gt;] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439 [\u0026lt;00000000c00628f8\u0026gt;] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46 [\u0026lt;000000004abfdcf4\u0026gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6 Para solucionar esto, el parche reorganiza las etiquetas goto para reflejar el orden de asignaci\u00f3n de objetos y a\u00f1ade instrucciones goto adecuadas en las rutas de error. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con Syzkaller.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.337\",\"versionEndExcluding\":\"4.10\",\"matchCriteriaId\":\"0C8C5100-ECF6-4F64-9489-EFC7923A7591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.303\",\"versionEndExcluding\":\"4.14.306\",\"matchCriteriaId\":\"8FD566E7-A4C9-4B80-8066-8813E4F64980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.270\",\"versionEndExcluding\":\"4.19.273\",\"matchCriteriaId\":\"8B5F7481-6295-443C-8297-AAA7400EAF0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.229\",\"versionEndExcluding\":\"5.4.232\",\"matchCriteriaId\":\"A8FD5F9C-EDEC-495D-9CA3-4D3154063522\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.163\",\"versionEndExcluding\":\"5.10.168\",\"matchCriteriaId\":\"6C254C95-139A-4910-972B-2E64E3030DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.86\",\"versionEndExcluding\":\"5.15.93\",\"matchCriteriaId\":\"21081389-6ED8-4898-80ED-81EF6A2B1FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.16\",\"versionEndExcluding\":\"6.1\",\"matchCriteriaId\":\"6C7522E3-150F-436D-BBD7-96C7B4B795ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.2\",\"versionEndExcluding\":\"6.1.11\",\"matchCriteriaId\":\"6AACE63B-510D-430C-ACD9-34922D790040\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…