CVE-2026-43194 (GCVE-0-2026-43194)

Vulnerability from cvelistv5 – Published: 2026-05-06 11:28 – Updated: 2026-05-08 12:41
VLAI?
Title
net: consume xmit errors of GSO frames
Summary
In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GSO frames udpgro_frglist.sh and udpgro_bench.sh are the flakiest tests currently in NIPA. They fail in the same exact way, TCP GRO test stalls occasionally and the test gets killed after 10min. These tests use veth to simulate GRO. They attach a trivial ("return XDP_PASS;") XDP program to the veth to force TSO off and NAPI on. Digging into the failure mode we can see that the connection is completely stuck after a burst of drops. The sender's snd_nxt is at sequence number N [1], but the receiver claims to have received (rcv_nxt) up to N + 3 * MSS [2]. Last piece of the puzzle is that senders rtx queue is not empty (let's say the block in the rtx queue is at sequence number N - 4 * MSS [3]). In this state, sender sends a retransmission from the rtx queue with a single segment, and sequence numbers N-4*MSS:N-3*MSS [3]. Receiver sees it and responds with an ACK all the way up to N + 3 * MSS [2]. But sender will reject this ack as TCP_ACK_UNSENT_DATA because it has no recollection of ever sending data that far out [1]. And we are stuck. The root cause is the mess of the xmit return codes. veth returns an error when it can't xmit a frame. We end up with a loss event like this: ------------------------------------------------- | GSO super frame 1 | GSO super frame 2 | |-----------------------------------------------| | seg | seg | seg | seg | seg | seg | seg | seg | | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | ------------------------------------------------- x ok ok <ok>| ok ok ok <x> \\ snd_nxt "x" means packet lost by veth, and "ok" means it went thru. Since veth has TSO disabled in this test it sees individual segments. Segment 1 is on the retransmit queue and will be resent. So why did the sender not advance snd_nxt even tho it clearly did send up to seg 8? tcp_write_xmit() interprets the return code from the core to mean that data has not been sent at all. Since TCP deals with GSO super frames, not individual segment the crux of the problem is that loss of a single segment can be interpreted as loss of all. TCP only sees the last return code for the last segment of the GSO frame (in <> brackets in the diagram above). Of course for the problem to occur we need a setup or a device without a Qdisc. Otherwise Qdisc layer disconnects the protocol layer from the device errors completely. We have multiple ways to fix this. 1) make veth not return an error when it lost a packet. While this is what I think we did in the past, the issue keeps reappearing and it's annoying to debug. The game of whack a mole is not great. 2) fix the damn return codes We only talk about NETDEV_TX_OK and NETDEV_TX_BUSY in the documentation, so maybe we should make the return code from ndo_start_xmit() a boolean. I like that the most, but perhaps some ancient, not-really-networking protocol would suffer. 3) make TCP ignore the errors It is not entirely clear to me what benefit TCP gets from interpreting the result of ip_queue_xmit()? Specifically once the connection is established and we're pushing data - packet loss is just packet loss? 4) this fix Ignore the rc in the Qdisc-less+GSO case, since it's unreliable. We already always return OK in the TCQ_F_CAN_BYPASS case. In the Qdisc-less case let's be a bit more conservative and only mask the GSO errors. This path is taken by non-IP-"networks" like CAN, MCTP etc, so we could regress some ancient thing. This is the simplest, but also maybe the hackiest fix? Similar fix has been proposed by Eric in the past but never committed because original reporter was working with an OOT driver and wasn't providing feedback (see Link).
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < ae3f627b45fbc3c776a4e484696f3cad7cbb4eca (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < 0c9de092ef8c50a7ee9612811566f0aa81d8d7b6 (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < 56bd32c0edca34041a5c215887fcf562fae2e2db (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < 9ac6aebef4b4bfc5ed408b0b65645981574bc780 (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < ea5d7787635e26ec1194ec7eec0e8e5ae3bd10a5 (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < 4cb163e9efcac4cd35c3043e097f25081a5c015c (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < c86901d22c89a6bf4e2f013e948aaabc60869893 (git)
Affected: 1f59533f9ca5634e7b8914252e48aee9d9cbe501 , < 7aa767d0d3d04e50ae94e770db7db8197f666970 (git)
Create a notification for this product.
    Linux Linux Affected: 3.18
Unaffected: 0 , < 3.18 (semver)
Unaffected: 5.10.252 , ≤ 5.10.* (semver)
Unaffected: 5.15.202 , ≤ 5.15.* (semver)
Unaffected: 6.1.165 , ≤ 6.1.* (semver)
Unaffected: 6.6.128 , ≤ 6.6.* (semver)
Unaffected: 6.12.75 , ≤ 6.12.* (semver)
Unaffected: 6.18.16 , ≤ 6.18.* (semver)
Unaffected: 6.19.6 , ≤ 6.19.* (semver)
Unaffected: 7.0 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/core/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ae3f627b45fbc3c776a4e484696f3cad7cbb4eca",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "0c9de092ef8c50a7ee9612811566f0aa81d8d7b6",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "56bd32c0edca34041a5c215887fcf562fae2e2db",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "9ac6aebef4b4bfc5ed408b0b65645981574bc780",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "ea5d7787635e26ec1194ec7eec0e8e5ae3bd10a5",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "4cb163e9efcac4cd35c3043e097f25081a5c015c",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "c86901d22c89a6bf4e2f013e948aaabc60869893",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            },
            {
              "lessThan": "7aa767d0d3d04e50ae94e770db7db8197f666970",
              "status": "affected",
              "version": "1f59533f9ca5634e7b8914252e48aee9d9cbe501",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/core/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.18"
            },
            {
              "lessThan": "3.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.252",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.202",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.165",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.128",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.75",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.19.*",
              "status": "unaffected",
              "version": "6.19.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.252",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.202",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.165",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.128",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.75",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.16",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.6",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "7.0",
                  "versionStartIncluding": "3.18",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: consume xmit errors of GSO frames\n\nudpgro_frglist.sh and udpgro_bench.sh are the flakiest tests\ncurrently in NIPA. They fail in the same exact way, TCP GRO\ntest stalls occasionally and the test gets killed after 10min.\n\nThese tests use veth to simulate GRO. They attach a trivial\n(\"return XDP_PASS;\") XDP program to the veth to force TSO off\nand NAPI on.\n\nDigging into the failure mode we can see that the connection\nis completely stuck after a burst of drops. The sender\u0027s snd_nxt\nis at sequence number N [1], but the receiver claims to have\nreceived (rcv_nxt) up to N + 3 * MSS [2]. Last piece of the puzzle\nis that senders rtx queue is not empty (let\u0027s say the block in\nthe rtx queue is at sequence number N - 4 * MSS [3]).\n\nIn this state, sender sends a retransmission from the rtx queue\nwith a single segment, and sequence numbers N-4*MSS:N-3*MSS [3].\nReceiver sees it and responds with an ACK all the way up to\nN + 3 * MSS [2]. But sender will reject this ack as TCP_ACK_UNSENT_DATA\nbecause it has no recollection of ever sending data that far out [1].\nAnd we are stuck.\n\nThe root cause is the mess of the xmit return codes. veth returns\nan error when it can\u0027t xmit a frame. We end up with a loss event\nlike this:\n\n  -------------------------------------------------\n  |   GSO super frame 1   |   GSO super frame 2   |\n  |-----------------------------------------------|\n  | seg | seg | seg | seg | seg | seg | seg | seg |\n  |  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |\n  -------------------------------------------------\n     x    ok    ok    \u003cok\u003e|  ok    ok    ok   \u003cx\u003e\n                          \\\\\n\t\t\t   snd_nxt\n\n\"x\" means packet lost by veth, and \"ok\" means it went thru.\nSince veth has TSO disabled in this test it sees individual segments.\nSegment 1 is on the retransmit queue and will be resent.\n\nSo why did the sender not advance snd_nxt even tho it clearly did\nsend up to seg 8? tcp_write_xmit() interprets the return code\nfrom the core to mean that data has not been sent at all. Since\nTCP deals with GSO super frames, not individual segment the crux\nof the problem is that loss of a single segment can be interpreted\nas loss of all. TCP only sees the last return code for the last\nsegment of the GSO frame (in \u003c\u003e brackets in the diagram above).\n\nOf course for the problem to occur we need a setup or a device\nwithout a Qdisc. Otherwise Qdisc layer disconnects the protocol\nlayer from the device errors completely.\n\nWe have multiple ways to fix this.\n\n 1) make veth not return an error when it lost a packet.\n    While this is what I think we did in the past, the issue keeps\n    reappearing and it\u0027s annoying to debug. The game of whack\n    a mole is not great.\n\n 2) fix the damn return codes\n    We only talk about NETDEV_TX_OK and NETDEV_TX_BUSY in the\n    documentation, so maybe we should make the return code from\n    ndo_start_xmit() a boolean. I like that the most, but perhaps\n    some ancient, not-really-networking protocol would suffer.\n\n 3) make TCP ignore the errors\n    It is not entirely clear to me what benefit TCP gets from\n    interpreting the result of ip_queue_xmit()? Specifically once\n    the connection is established and we\u0027re pushing data - packet\n    loss is just packet loss?\n\n 4) this fix\n    Ignore the rc in the Qdisc-less+GSO case, since it\u0027s unreliable.\n    We already always return OK in the TCQ_F_CAN_BYPASS case.\n    In the Qdisc-less case let\u0027s be a bit more conservative and only\n    mask the GSO errors. This path is taken by non-IP-\"networks\"\n    like CAN, MCTP etc, so we could regress some ancient thing.\n    This is the simplest, but also maybe the hackiest fix?\n\nSimilar fix has been proposed by Eric in the past but never committed\nbecause original reporter was working with an OOT driver and wasn\u0027t\nproviding feedback (see Link)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-08T12:41:08.123Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ae3f627b45fbc3c776a4e484696f3cad7cbb4eca"
        },
        {
          "url": "https://git.kernel.org/stable/c/0c9de092ef8c50a7ee9612811566f0aa81d8d7b6"
        },
        {
          "url": "https://git.kernel.org/stable/c/56bd32c0edca34041a5c215887fcf562fae2e2db"
        },
        {
          "url": "https://git.kernel.org/stable/c/9ac6aebef4b4bfc5ed408b0b65645981574bc780"
        },
        {
          "url": "https://git.kernel.org/stable/c/ea5d7787635e26ec1194ec7eec0e8e5ae3bd10a5"
        },
        {
          "url": "https://git.kernel.org/stable/c/4cb163e9efcac4cd35c3043e097f25081a5c015c"
        },
        {
          "url": "https://git.kernel.org/stable/c/c86901d22c89a6bf4e2f013e948aaabc60869893"
        },
        {
          "url": "https://git.kernel.org/stable/c/7aa767d0d3d04e50ae94e770db7db8197f666970"
        }
      ],
      "title": "net: consume xmit errors of GSO frames",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-43194",
    "datePublished": "2026-05-06T11:28:02.794Z",
    "dateReserved": "2026-05-01T14:12:55.992Z",
    "dateUpdated": "2026-05-08T12:41:08.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-43194",
      "date": "2026-05-09",
      "epss": "0.00052",
      "percentile": "0.16116"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-43194\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:38.310\",\"lastModified\":\"2026-05-08T13:16:44.460\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: consume xmit errors of GSO frames\\n\\nudpgro_frglist.sh and udpgro_bench.sh are the flakiest tests\\ncurrently in NIPA. They fail in the same exact way, TCP GRO\\ntest stalls occasionally and the test gets killed after 10min.\\n\\nThese tests use veth to simulate GRO. They attach a trivial\\n(\\\"return XDP_PASS;\\\") XDP program to the veth to force TSO off\\nand NAPI on.\\n\\nDigging into the failure mode we can see that the connection\\nis completely stuck after a burst of drops. The sender\u0027s snd_nxt\\nis at sequence number N [1], but the receiver claims to have\\nreceived (rcv_nxt) up to N + 3 * MSS [2]. Last piece of the puzzle\\nis that senders rtx queue is not empty (let\u0027s say the block in\\nthe rtx queue is at sequence number N - 4 * MSS [3]).\\n\\nIn this state, sender sends a retransmission from the rtx queue\\nwith a single segment, and sequence numbers N-4*MSS:N-3*MSS [3].\\nReceiver sees it and responds with an ACK all the way up to\\nN + 3 * MSS [2]. But sender will reject this ack as TCP_ACK_UNSENT_DATA\\nbecause it has no recollection of ever sending data that far out [1].\\nAnd we are stuck.\\n\\nThe root cause is the mess of the xmit return codes. veth returns\\nan error when it can\u0027t xmit a frame. We end up with a loss event\\nlike this:\\n\\n  -------------------------------------------------\\n  |   GSO super frame 1   |   GSO super frame 2   |\\n  |-----------------------------------------------|\\n  | seg | seg | seg | seg | seg | seg | seg | seg |\\n  |  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |\\n  -------------------------------------------------\\n     x    ok    ok    \u003cok\u003e|  ok    ok    ok   \u003cx\u003e\\n                          \\\\\\\\\\n\\t\\t\\t   snd_nxt\\n\\n\\\"x\\\" means packet lost by veth, and \\\"ok\\\" means it went thru.\\nSince veth has TSO disabled in this test it sees individual segments.\\nSegment 1 is on the retransmit queue and will be resent.\\n\\nSo why did the sender not advance snd_nxt even tho it clearly did\\nsend up to seg 8? tcp_write_xmit() interprets the return code\\nfrom the core to mean that data has not been sent at all. Since\\nTCP deals with GSO super frames, not individual segment the crux\\nof the problem is that loss of a single segment can be interpreted\\nas loss of all. TCP only sees the last return code for the last\\nsegment of the GSO frame (in \u003c\u003e brackets in the diagram above).\\n\\nOf course for the problem to occur we need a setup or a device\\nwithout a Qdisc. Otherwise Qdisc layer disconnects the protocol\\nlayer from the device errors completely.\\n\\nWe have multiple ways to fix this.\\n\\n 1) make veth not return an error when it lost a packet.\\n    While this is what I think we did in the past, the issue keeps\\n    reappearing and it\u0027s annoying to debug. The game of whack\\n    a mole is not great.\\n\\n 2) fix the damn return codes\\n    We only talk about NETDEV_TX_OK and NETDEV_TX_BUSY in the\\n    documentation, so maybe we should make the return code from\\n    ndo_start_xmit() a boolean. I like that the most, but perhaps\\n    some ancient, not-really-networking protocol would suffer.\\n\\n 3) make TCP ignore the errors\\n    It is not entirely clear to me what benefit TCP gets from\\n    interpreting the result of ip_queue_xmit()? Specifically once\\n    the connection is established and we\u0027re pushing data - packet\\n    loss is just packet loss?\\n\\n 4) this fix\\n    Ignore the rc in the Qdisc-less+GSO case, since it\u0027s unreliable.\\n    We already always return OK in the TCQ_F_CAN_BYPASS case.\\n    In the Qdisc-less case let\u0027s be a bit more conservative and only\\n    mask the GSO errors. This path is taken by non-IP-\\\"networks\\\"\\n    like CAN, MCTP etc, so we could regress some ancient thing.\\n    This is the simplest, but also maybe the hackiest fix?\\n\\nSimilar fix has been proposed by Eric in the past but never committed\\nbecause original reporter was working with an OOT driver and wasn\u0027t\\nproviding feedback (see Link).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0c9de092ef8c50a7ee9612811566f0aa81d8d7b6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4cb163e9efcac4cd35c3043e097f25081a5c015c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/56bd32c0edca34041a5c215887fcf562fae2e2db\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7aa767d0d3d04e50ae94e770db7db8197f666970\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9ac6aebef4b4bfc5ed408b0b65645981574bc780\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ae3f627b45fbc3c776a4e484696f3cad7cbb4eca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c86901d22c89a6bf4e2f013e948aaabc60869893\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ea5d7787635e26ec1194ec7eec0e8e5ae3bd10a5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…