cve-2024-40947
Vulnerability from cvelistv5
Published
2024-07-12 12:31
Modified
2024-11-05 09:33
Severity ?
Summary
ima: Avoid blocking in RCU read-side critical section
Impacted products
Vendor Product Version
Linux Linux Version: 6.2
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:39:55.943Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a6176a802c4bfb83bf7524591aa75f44a639a853"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a38e02265c681b51997a264aaf743095e2ee400a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9c3906c3738562b1fedc6f1cfc81756a7cfefff0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/28d0ecc52f6c927d0e9ba70a4f2c1ea15453ee88"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/58275455893066149e9f4df2223ab2fdbdc59f9c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-40947",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T17:04:11.306292Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:25.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "include/linux/lsm_hook_defs.h",
            "include/linux/security.h",
            "kernel/auditfilter.c",
            "security/apparmor/audit.c",
            "security/apparmor/include/audit.h",
            "security/integrity/ima/ima.h",
            "security/integrity/ima/ima_policy.c",
            "security/security.c",
            "security/selinux/include/audit.h",
            "security/selinux/ss/services.c",
            "security/smack/smack_lsm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "a6176a802c4b",
              "status": "affected",
              "version": "c4b035b1f036",
              "versionType": "git"
            },
            {
              "lessThan": "a38e02265c68",
              "status": "affected",
              "version": "2d4bc60693c4",
              "versionType": "git"
            },
            {
              "lessThan": "9c3906c37385",
              "status": "affected",
              "version": "8008f1691c15",
              "versionType": "git"
            },
            {
              "lessThan": "28d0ecc52f6c",
              "status": "affected",
              "version": "c7423dbdbc9e",
              "versionType": "git"
            },
            {
              "lessThan": "582754558930",
              "status": "affected",
              "version": "c7423dbdbc9e",
              "versionType": "git"
            },
            {
              "lessThan": "9a95c5bfbf02",
              "status": "affected",
              "version": "c7423dbdbc9e",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "include/linux/lsm_hook_defs.h",
            "include/linux/security.h",
            "kernel/auditfilter.c",
            "security/apparmor/audit.c",
            "security/apparmor/include/audit.h",
            "security/integrity/ima/ima.h",
            "security/integrity/ima/ima_policy.c",
            "security/security.c",
            "security/selinux/include/audit.h",
            "security/selinux/ss/services.c",
            "security/smack/smack_lsm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.2"
            },
            {
              "lessThan": "6.2",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.222",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.163",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.98",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.39",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Avoid blocking in RCU read-side critical section\n\nA panic happens in ima_match_policy:\n\nBUG: unable to handle kernel NULL pointer dereference at 0000000000000010\nPGD 42f873067 P4D 0\nOops: 0000 [#1] SMP NOPTI\nCPU: 5 PID: 1286325 Comm: kubeletmonit.sh\nKdump: loaded Tainted: P\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\n               BIOS 0.0.0 02/06/2015\nRIP: 0010:ima_match_policy+0x84/0x450\nCode: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39\n      7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d\n      f2 b9 f4 00 0f 84 9c 01 00 00 \u003c44\u003e 85 73 10 74 ea\n      44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f\nRSP: 0018:ff71570009e07a80 EFLAGS: 00010207\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000200\nRDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000\nRBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffabfce739\nR10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970\nR13: 00000000ff3e2785 R14: 000000000000000c R15: 0000000000000001\nFS:  00007f5195b51740(0000)\nGS:ff3e278b12d40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n ima_get_action+0x22/0x30\n process_measurement+0xb0/0x830\n ? page_add_file_rmap+0x15/0x170\n ? alloc_set_pte+0x269/0x4c0\n ? prep_new_page+0x81/0x140\n ? simple_xattr_get+0x75/0xa0\n ? selinux_file_open+0x9d/0xf0\n ima_file_check+0x64/0x90\n path_openat+0x571/0x1720\n do_filp_open+0x9b/0x110\n ? page_counter_try_charge+0x57/0xc0\n ? files_cgroup_alloc_fd+0x38/0x60\n ? __alloc_fd+0xd4/0x250\n ? do_sys_open+0x1bd/0x250\n do_sys_open+0x1bd/0x250\n do_syscall_64+0x5d/0x1d0\n entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nCommit c7423dbdbc9e (\"ima: Handle -ESTALE returned by\nima_filter_rule_match()\") introduced call to ima_lsm_copy_rule within a\nRCU read-side critical section which contains kmalloc with GFP_KERNEL.\nThis implies a possible sleep and violates limitations of RCU read-side\ncritical sections on non-PREEMPT systems.\n\nSleeping within RCU read-side critical section might cause\nsynchronize_rcu() returning early and break RCU protection, allowing a\nUAF to happen.\n\nThe root cause of this issue could be described as follows:\n|\tThread A\t|\tThread B\t|\n|\t\t\t|ima_match_policy\t|\n|\t\t\t|  rcu_read_lock\t|\n|ima_lsm_update_rule\t|\t\t\t|\n|  synchronize_rcu\t|\t\t\t|\n|\t\t\t|    kmalloc(GFP_KERNEL)|\n|\t\t\t|      sleep\t\t|\n==\u003e synchronize_rcu returns early\n|  kfree(entry)\t\t|\t\t\t|\n|\t\t\t|    entry = entry-\u003enext|\n==\u003e UAF happens and entry now becomes NULL (or could be anything).\n|\t\t\t|    entry-\u003eaction\t|\n==\u003e Accessing entry might cause panic.\n\nTo fix this issue, we are converting all kmalloc that is called within\nRCU read-side critical section to use GFP_ATOMIC.\n\n[PM: fixed missing comment, long lines, !CONFIG_IMA_LSM_RULES case]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:33:42.804Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/a6176a802c4bfb83bf7524591aa75f44a639a853"
        },
        {
          "url": "https://git.kernel.org/stable/c/a38e02265c681b51997a264aaf743095e2ee400a"
        },
        {
          "url": "https://git.kernel.org/stable/c/9c3906c3738562b1fedc6f1cfc81756a7cfefff0"
        },
        {
          "url": "https://git.kernel.org/stable/c/28d0ecc52f6c927d0e9ba70a4f2c1ea15453ee88"
        },
        {
          "url": "https://git.kernel.org/stable/c/58275455893066149e9f4df2223ab2fdbdc59f9c"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34"
        }
      ],
      "title": "ima: Avoid blocking in RCU read-side critical section",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-40947",
    "datePublished": "2024-07-12T12:31:52.810Z",
    "dateReserved": "2024-07-12T12:17:45.589Z",
    "dateUpdated": "2024-11-05T09:33:42.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-40947\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-12T13:15:17.073\",\"lastModified\":\"2024-11-21T09:31:55.580\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nima: Avoid blocking in RCU read-side critical section\\n\\nA panic happens in ima_match_policy:\\n\\nBUG: unable to handle kernel NULL pointer dereference at 0000000000000010\\nPGD 42f873067 P4D 0\\nOops: 0000 [#1] SMP NOPTI\\nCPU: 5 PID: 1286325 Comm: kubeletmonit.sh\\nKdump: loaded Tainted: P\\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\\n               BIOS 0.0.0 02/06/2015\\nRIP: 0010:ima_match_policy+0x84/0x450\\nCode: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39\\n      7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d\\n      f2 b9 f4 00 0f 84 9c 01 00 00 \u003c44\u003e 85 73 10 74 ea\\n      44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f\\nRSP: 0018:ff71570009e07a80 EFLAGS: 00010207\\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000200\\nRDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000\\nRBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffabfce739\\nR10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970\\nR13: 00000000ff3e2785 R14: 000000000000000c R15: 0000000000000001\\nFS:  00007f5195b51740(0000)\\nGS:ff3e278b12d40000(0000) knlGS:0000000000000000\\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nCR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0\\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\nCall Trace:\\n ima_get_action+0x22/0x30\\n process_measurement+0xb0/0x830\\n ? page_add_file_rmap+0x15/0x170\\n ? alloc_set_pte+0x269/0x4c0\\n ? prep_new_page+0x81/0x140\\n ? simple_xattr_get+0x75/0xa0\\n ? selinux_file_open+0x9d/0xf0\\n ima_file_check+0x64/0x90\\n path_openat+0x571/0x1720\\n do_filp_open+0x9b/0x110\\n ? page_counter_try_charge+0x57/0xc0\\n ? files_cgroup_alloc_fd+0x38/0x60\\n ? __alloc_fd+0xd4/0x250\\n ? do_sys_open+0x1bd/0x250\\n do_sys_open+0x1bd/0x250\\n do_syscall_64+0x5d/0x1d0\\n entry_SYSCALL_64_after_hwframe+0x65/0xca\\n\\nCommit c7423dbdbc9e (\\\"ima: Handle -ESTALE returned by\\nima_filter_rule_match()\\\") introduced call to ima_lsm_copy_rule within a\\nRCU read-side critical section which contains kmalloc with GFP_KERNEL.\\nThis implies a possible sleep and violates limitations of RCU read-side\\ncritical sections on non-PREEMPT systems.\\n\\nSleeping within RCU read-side critical section might cause\\nsynchronize_rcu() returning early and break RCU protection, allowing a\\nUAF to happen.\\n\\nThe root cause of this issue could be described as follows:\\n|\\tThread A\\t|\\tThread B\\t|\\n|\\t\\t\\t|ima_match_policy\\t|\\n|\\t\\t\\t|  rcu_read_lock\\t|\\n|ima_lsm_update_rule\\t|\\t\\t\\t|\\n|  synchronize_rcu\\t|\\t\\t\\t|\\n|\\t\\t\\t|    kmalloc(GFP_KERNEL)|\\n|\\t\\t\\t|      sleep\\t\\t|\\n==\u003e synchronize_rcu returns early\\n|  kfree(entry)\\t\\t|\\t\\t\\t|\\n|\\t\\t\\t|    entry = entry-\u003enext|\\n==\u003e UAF happens and entry now becomes NULL (or could be anything).\\n|\\t\\t\\t|    entry-\u003eaction\\t|\\n==\u003e Accessing entry might cause panic.\\n\\nTo fix this issue, we are converting all kmalloc that is called within\\nRCU read-side critical section to use GFP_ATOMIC.\\n\\n[PM: fixed missing comment, long lines, !CONFIG_IMA_LSM_RULES case]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ima: Evite el bloqueo en la secci\u00f3n cr\u00edtica del lado de lectura de RCU Ocurre un p\u00e1nico en ima_match_policy: ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 00000000000000010 PGD 42f873067 P4D 0 Ups: 0000 [#1 ] SMP NOPTI CPU: 5 PID: 1286325 Comm: kubeletmonit.sh Kdump: cargado Contaminado: P Nombre del hardware: QEMU PC est\u00e1ndar (i440FX + PIIX, 1996), BIOS 0.0.0 06/02/2015 RIP: 0010:ima_match_policy+0x84 /0x450 C\u00f3digo: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39 7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d f2 b9 f4 00 0f 84 9c 01 00 \u0026lt;44\u0026gt; 85 73 10 74 ea 44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f RSP: 0018:ff71570009e07a80 EFLAGS: 00010207 RAX: 0000000000000000 RBX: 0000000000 RCX: 0000000000000200 RDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000 RBP: 0000000000000000 R08 : 0000000000000000 R09: ffffffffabfce739 R10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970 R13: 00000000ff3e2785 R14: 000000000c R15: 0000000000000001 FS: 00007f5195b51740(0000) GS:ff3e278b12d40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: : 0000000080050033 CR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ima_get_action+0x22/0x30 Process_measurement+0xb0/0x830 ? page_add_file_rmap+0x15/0x170? alloc_set_pte+0x269/0x4c0? prep_new_page+0x81/0x140? simple_xattr_get+0x75/0xa0? selinux_file_open+0x9d/0xf0 ima_file_check+0x64/0x90 path_openat+0x571/0x1720 do_filp_open+0x9b/0x110 ? page_counter_try_charge+0x57/0xc0? files_cgroup_alloc_fd+0x38/0x60? __alloc_fd+0xd4/0x250? do_sys_open+0x1bd/0x250 do_sys_open+0x1bd/0x250 do_syscall_64+0x5d/0x1d0 Entry_SYSCALL_64_after_hwframe+0x65/0xca Commit c7423dbdbc9e (\\\"ima: Handle -ESTALE devuelto por ima_filter_rule_match()\\\") introdujo la llamada a ima_lsm _copy_rule dentro de una secci\u00f3n cr\u00edtica del lado de lectura de RCU que contiene kmalloc con GFP_KERNEL. Esto implica una posible suspensi\u00f3n y viola las limitaciones de las secciones cr\u00edticas del lado de lectura de RCU en sistemas que no son PREEMPT. Dormir dentro de la secci\u00f3n cr\u00edtica del lado de lectura de la RCU puede provocar que sincronizar_rcu() regrese antes de tiempo y rompa la protecci\u00f3n de la RCU, lo que permite que se produzca una UAF. La causa ra\u00edz de este problema podr\u00eda describirse de la siguiente manera: | Hilo A | Hilo B | | |ima_match_policy | | | rcu_read_lock | |ima_lsm_update_rule | | | sincronizar_rcu | | | | kmalloc(GFP_KERNEL)| | | dormir | ==\u0026gt; sincronizar_rcu regresa temprano | kfree(entrada) | | | | entrada = entrada-\u0026gt;siguiente| ==\u0026gt; Sucede UAF y la entrada ahora se vuelve NULL (o podr\u00eda ser cualquier cosa). | | entrada-\u0026gt;acci\u00f3n | ==\u0026gt; Acceder a la entrada puede causar p\u00e1nico. Para solucionar este problema, estamos convirtiendo todos los kmalloc que se llaman dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU para usar GFP_ATOMIC. [PM: comentario faltante corregido, l\u00edneas largas, caso !CONFIG_IMA_LSM_RULES]\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/28d0ecc52f6c927d0e9ba70a4f2c1ea15453ee88\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/58275455893066149e9f4df2223ab2fdbdc59f9c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9c3906c3738562b1fedc6f1cfc81756a7cfefff0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a38e02265c681b51997a264aaf743095e2ee400a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6176a802c4bfb83bf7524591aa75f44a639a853\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/28d0ecc52f6c927d0e9ba70a4f2c1ea15453ee88\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/58275455893066149e9f4df2223ab2fdbdc59f9c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9c3906c3738562b1fedc6f1cfc81756a7cfefff0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a38e02265c681b51997a264aaf743095e2ee400a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a6176a802c4bfb83bf7524591aa75f44a639a853\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.