CVE-2023-53831 (GCVE-0-2023-53831)

Vulnerability from cvelistv5 – Published: 2025-12-09 01:29 – Updated: 2025-12-09 01:29
VLAI?
Title
net: read sk->sk_family once in sk_mc_loop()
Summary
In the Linux kernel, the following vulnerability has been resolved: net: read sk->sk_family once in sk_mc_loop() syzbot is playing with IPV6_ADDRFORM quite a lot these days, and managed to hit the WARN_ON_ONCE(1) in sk_mc_loop() We have many more similar issues to fix. WARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260 Modules linked in: CPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 Workqueue: events_power_efficient gc_worker RIP: 0010:sk_mc_loop+0x165/0x260 net/core/sock.c:782 Code: 34 1b fd 49 81 c7 18 05 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 25 36 6d fd 4d 8b 37 eb 13 e8 db 33 1b fd <0f> 0b b3 01 eb 34 e8 d0 33 1b fd 45 31 f6 49 83 c6 38 4c 89 f0 48 RSP: 0018:ffffc90000388530 EFLAGS: 00010246 RAX: ffffffff846d9b55 RBX: 0000000000000011 RCX: ffff88814f884980 RDX: 0000000000000102 RSI: ffffffff87ae5160 RDI: 0000000000000011 RBP: ffffc90000388550 R08: 0000000000000003 R09: ffffffff846d9a65 R10: 0000000000000002 R11: ffff88814f884980 R12: dffffc0000000000 R13: ffff88810dbee000 R14: 0000000000000010 R15: ffff888150084000 FS: 0000000000000000(0000) GS:ffff8881f6b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 000000014ee5b000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> [<ffffffff8507734f>] ip6_finish_output2+0x33f/0x1ae0 net/ipv6/ip6_output.c:83 [<ffffffff85062766>] __ip6_finish_output net/ipv6/ip6_output.c:200 [inline] [<ffffffff85062766>] ip6_finish_output+0x6c6/0xb10 net/ipv6/ip6_output.c:211 [<ffffffff85061f8c>] NF_HOOK_COND include/linux/netfilter.h:298 [inline] [<ffffffff85061f8c>] ip6_output+0x2bc/0x3d0 net/ipv6/ip6_output.c:232 [<ffffffff852071cf>] dst_output include/net/dst.h:444 [inline] [<ffffffff852071cf>] ip6_local_out+0x10f/0x140 net/ipv6/output_core.c:161 [<ffffffff83618fb4>] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:483 [inline] [<ffffffff83618fb4>] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline] [<ffffffff83618fb4>] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline] [<ffffffff83618fb4>] ipvlan_queue_xmit+0x1174/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677 [<ffffffff8361ddd9>] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229 [<ffffffff84763fc0>] netdev_start_xmit include/linux/netdevice.h:4925 [inline] [<ffffffff84763fc0>] xmit_one net/core/dev.c:3644 [inline] [<ffffffff84763fc0>] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660 [<ffffffff8494c650>] sch_direct_xmit+0x2a0/0x9c0 net/sched/sch_generic.c:342 [<ffffffff8494d883>] qdisc_restart net/sched/sch_generic.c:407 [inline] [<ffffffff8494d883>] __qdisc_run+0xb13/0x1e70 net/sched/sch_generic.c:415 [<ffffffff8478c426>] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125 [<ffffffff84796eac>] net_tx_action+0x7ac/0x940 net/core/dev.c:5247 [<ffffffff858002bd>] __do_softirq+0x2bd/0x9bd kernel/softirq.c:599 [<ffffffff814c3fe8>] invoke_softirq kernel/softirq.c:430 [inline] [<ffffffff814c3fe8>] __irq_exit_rcu+0xc8/0x170 kernel/softirq.c:683 [<ffffffff814c3f09>] irq_exit_rcu+0x9/0x20 kernel/softirq.c:695
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < 7586a66b9c4f1b8a825ea1dfa3a91aad5cc7b89b (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < e918d0211ffbaf039447334c3460cafee1ce0157 (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < 41f10a4d78fe69d685a3172e6884297f233dcf95 (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < 895dc4c47171a20035cdaa8d74c1c1e97f2fc974 (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < ed4e0adfa407ab65dd73b8862ebf2f308a0349d2 (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < 9036b6342fcdab190d6edce3dd447859c1de90fc (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < b1f5b890b89cb38a6c0bac91984d56cd69808e8c (git)
Affected: 7ad6848c7e81a603605fad3f3575841aab004eea , < a3e0fdf71bbe031de845e8e08ed7fba49f9c702c (git)
Create a notification for this product.
    Linux Linux Affected: 2.6.33
Unaffected: 0 , < 2.6.33 (semver)
Unaffected: 4.14.326 , ≤ 4.14.* (semver)
Unaffected: 4.19.295 , ≤ 4.19.* (semver)
Unaffected: 5.4.257 , ≤ 5.4.* (semver)
Unaffected: 5.10.195 , ≤ 5.10.* (semver)
Unaffected: 5.15.132 , ≤ 5.15.* (semver)
Unaffected: 6.1.54 , ≤ 6.1.* (semver)
Unaffected: 6.5.4 , ≤ 6.5.* (semver)
Unaffected: 6.6 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/core/sock.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "7586a66b9c4f1b8a825ea1dfa3a91aad5cc7b89b",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "e918d0211ffbaf039447334c3460cafee1ce0157",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "41f10a4d78fe69d685a3172e6884297f233dcf95",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "895dc4c47171a20035cdaa8d74c1c1e97f2fc974",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "ed4e0adfa407ab65dd73b8862ebf2f308a0349d2",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "9036b6342fcdab190d6edce3dd447859c1de90fc",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "b1f5b890b89cb38a6c0bac91984d56cd69808e8c",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            },
            {
              "lessThan": "a3e0fdf71bbe031de845e8e08ed7fba49f9c702c",
              "status": "affected",
              "version": "7ad6848c7e81a603605fad3f3575841aab004eea",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/core/sock.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.33"
            },
            {
              "lessThan": "2.6.33",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.326",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.295",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.257",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.195",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.132",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.326",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.295",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.257",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.195",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.132",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.54",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.4",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: read sk-\u003esk_family once in sk_mc_loop()\n\nsyzbot is playing with IPV6_ADDRFORM quite a lot these days,\nand managed to hit the WARN_ON_ONCE(1) in sk_mc_loop()\n\nWe have many more similar issues to fix.\n\nWARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260\nModules linked in:\nCPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\nWorkqueue: events_power_efficient gc_worker\nRIP: 0010:sk_mc_loop+0x165/0x260 net/core/sock.c:782\nCode: 34 1b fd 49 81 c7 18 05 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 25 36 6d fd 4d 8b 37 eb 13 e8 db 33 1b fd \u003c0f\u003e 0b b3 01 eb 34 e8 d0 33 1b fd 45 31 f6 49 83 c6 38 4c 89 f0 48\nRSP: 0018:ffffc90000388530 EFLAGS: 00010246\nRAX: ffffffff846d9b55 RBX: 0000000000000011 RCX: ffff88814f884980\nRDX: 0000000000000102 RSI: ffffffff87ae5160 RDI: 0000000000000011\nRBP: ffffc90000388550 R08: 0000000000000003 R09: ffffffff846d9a65\nR10: 0000000000000002 R11: ffff88814f884980 R12: dffffc0000000000\nR13: ffff88810dbee000 R14: 0000000000000010 R15: ffff888150084000\nFS: 0000000000000000(0000) GS:ffff8881f6b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000180 CR3: 000000014ee5b000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cIRQ\u003e\n[\u003cffffffff8507734f\u003e] ip6_finish_output2+0x33f/0x1ae0 net/ipv6/ip6_output.c:83\n[\u003cffffffff85062766\u003e] __ip6_finish_output net/ipv6/ip6_output.c:200 [inline]\n[\u003cffffffff85062766\u003e] ip6_finish_output+0x6c6/0xb10 net/ipv6/ip6_output.c:211\n[\u003cffffffff85061f8c\u003e] NF_HOOK_COND include/linux/netfilter.h:298 [inline]\n[\u003cffffffff85061f8c\u003e] ip6_output+0x2bc/0x3d0 net/ipv6/ip6_output.c:232\n[\u003cffffffff852071cf\u003e] dst_output include/net/dst.h:444 [inline]\n[\u003cffffffff852071cf\u003e] ip6_local_out+0x10f/0x140 net/ipv6/output_core.c:161\n[\u003cffffffff83618fb4\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:483 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff83618fb4\u003e] ipvlan_queue_xmit+0x1174/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff8361ddd9\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84763fc0\u003e] netdev_start_xmit include/linux/netdevice.h:4925 [inline]\n[\u003cffffffff84763fc0\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84763fc0\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff8494c650\u003e] sch_direct_xmit+0x2a0/0x9c0 net/sched/sch_generic.c:342\n[\u003cffffffff8494d883\u003e] qdisc_restart net/sched/sch_generic.c:407 [inline]\n[\u003cffffffff8494d883\u003e] __qdisc_run+0xb13/0x1e70 net/sched/sch_generic.c:415\n[\u003cffffffff8478c426\u003e] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125\n[\u003cffffffff84796eac\u003e] net_tx_action+0x7ac/0x940 net/core/dev.c:5247\n[\u003cffffffff858002bd\u003e] __do_softirq+0x2bd/0x9bd kernel/softirq.c:599\n[\u003cffffffff814c3fe8\u003e] invoke_softirq kernel/softirq.c:430 [inline]\n[\u003cffffffff814c3fe8\u003e] __irq_exit_rcu+0xc8/0x170 kernel/softirq.c:683\n[\u003cffffffff814c3f09\u003e] irq_exit_rcu+0x9/0x20 kernel/softirq.c:695"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-09T01:29:46.374Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/7586a66b9c4f1b8a825ea1dfa3a91aad5cc7b89b"
        },
        {
          "url": "https://git.kernel.org/stable/c/e918d0211ffbaf039447334c3460cafee1ce0157"
        },
        {
          "url": "https://git.kernel.org/stable/c/41f10a4d78fe69d685a3172e6884297f233dcf95"
        },
        {
          "url": "https://git.kernel.org/stable/c/895dc4c47171a20035cdaa8d74c1c1e97f2fc974"
        },
        {
          "url": "https://git.kernel.org/stable/c/ed4e0adfa407ab65dd73b8862ebf2f308a0349d2"
        },
        {
          "url": "https://git.kernel.org/stable/c/9036b6342fcdab190d6edce3dd447859c1de90fc"
        },
        {
          "url": "https://git.kernel.org/stable/c/b1f5b890b89cb38a6c0bac91984d56cd69808e8c"
        },
        {
          "url": "https://git.kernel.org/stable/c/a3e0fdf71bbe031de845e8e08ed7fba49f9c702c"
        }
      ],
      "title": "net: read sk-\u003esk_family once in sk_mc_loop()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53831",
    "datePublished": "2025-12-09T01:29:46.374Z",
    "dateReserved": "2025-12-09T01:27:17.825Z",
    "dateUpdated": "2025-12-09T01:29:46.374Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53831\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-09T16:17:22.017\",\"lastModified\":\"2025-12-09T18:37:13.640\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: read sk-\u003esk_family once in sk_mc_loop()\\n\\nsyzbot is playing with IPV6_ADDRFORM quite a lot these days,\\nand managed to hit the WARN_ON_ONCE(1) in sk_mc_loop()\\n\\nWe have many more similar issues to fix.\\n\\nWARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260\\nModules linked in:\\nCPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0\\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\\nWorkqueue: events_power_efficient gc_worker\\nRIP: 0010:sk_mc_loop+0x165/0x260 net/core/sock.c:782\\nCode: 34 1b fd 49 81 c7 18 05 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 25 36 6d fd 4d 8b 37 eb 13 e8 db 33 1b fd \u003c0f\u003e 0b b3 01 eb 34 e8 d0 33 1b fd 45 31 f6 49 83 c6 38 4c 89 f0 48\\nRSP: 0018:ffffc90000388530 EFLAGS: 00010246\\nRAX: ffffffff846d9b55 RBX: 0000000000000011 RCX: ffff88814f884980\\nRDX: 0000000000000102 RSI: ffffffff87ae5160 RDI: 0000000000000011\\nRBP: ffffc90000388550 R08: 0000000000000003 R09: ffffffff846d9a65\\nR10: 0000000000000002 R11: ffff88814f884980 R12: dffffc0000000000\\nR13: ffff88810dbee000 R14: 0000000000000010 R15: ffff888150084000\\nFS: 0000000000000000(0000) GS:ffff8881f6b00000(0000) knlGS:0000000000000000\\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nCR2: 0000000020000180 CR3: 000000014ee5b000 CR4: 00000000003506e0\\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\nCall Trace:\\n\u003cIRQ\u003e\\n[\u003cffffffff8507734f\u003e] ip6_finish_output2+0x33f/0x1ae0 net/ipv6/ip6_output.c:83\\n[\u003cffffffff85062766\u003e] __ip6_finish_output net/ipv6/ip6_output.c:200 [inline]\\n[\u003cffffffff85062766\u003e] ip6_finish_output+0x6c6/0xb10 net/ipv6/ip6_output.c:211\\n[\u003cffffffff85061f8c\u003e] NF_HOOK_COND include/linux/netfilter.h:298 [inline]\\n[\u003cffffffff85061f8c\u003e] ip6_output+0x2bc/0x3d0 net/ipv6/ip6_output.c:232\\n[\u003cffffffff852071cf\u003e] dst_output include/net/dst.h:444 [inline]\\n[\u003cffffffff852071cf\u003e] ip6_local_out+0x10f/0x140 net/ipv6/output_core.c:161\\n[\u003cffffffff83618fb4\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:483 [inline]\\n[\u003cffffffff83618fb4\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\\n[\u003cffffffff83618fb4\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\\n[\u003cffffffff83618fb4\u003e] ipvlan_queue_xmit+0x1174/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\\n[\u003cffffffff8361ddd9\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\\n[\u003cffffffff84763fc0\u003e] netdev_start_xmit include/linux/netdevice.h:4925 [inline]\\n[\u003cffffffff84763fc0\u003e] xmit_one net/core/dev.c:3644 [inline]\\n[\u003cffffffff84763fc0\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\\n[\u003cffffffff8494c650\u003e] sch_direct_xmit+0x2a0/0x9c0 net/sched/sch_generic.c:342\\n[\u003cffffffff8494d883\u003e] qdisc_restart net/sched/sch_generic.c:407 [inline]\\n[\u003cffffffff8494d883\u003e] __qdisc_run+0xb13/0x1e70 net/sched/sch_generic.c:415\\n[\u003cffffffff8478c426\u003e] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125\\n[\u003cffffffff84796eac\u003e] net_tx_action+0x7ac/0x940 net/core/dev.c:5247\\n[\u003cffffffff858002bd\u003e] __do_softirq+0x2bd/0x9bd kernel/softirq.c:599\\n[\u003cffffffff814c3fe8\u003e] invoke_softirq kernel/softirq.c:430 [inline]\\n[\u003cffffffff814c3fe8\u003e] __irq_exit_rcu+0xc8/0x170 kernel/softirq.c:683\\n[\u003cffffffff814c3f09\u003e] irq_exit_rcu+0x9/0x20 kernel/softirq.c:695\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/41f10a4d78fe69d685a3172e6884297f233dcf95\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7586a66b9c4f1b8a825ea1dfa3a91aad5cc7b89b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/895dc4c47171a20035cdaa8d74c1c1e97f2fc974\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9036b6342fcdab190d6edce3dd447859c1de90fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3e0fdf71bbe031de845e8e08ed7fba49f9c702c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b1f5b890b89cb38a6c0bac91984d56cd69808e8c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e918d0211ffbaf039447334c3460cafee1ce0157\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ed4e0adfa407ab65dd73b8862ebf2f308a0349d2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…