suse-su-2017:2066-1
Vulnerability from csaf_suse
Published
2017-08-07 08:08
Modified
2017-08-07 08:08
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
The following non-security bug was fixed:
- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON's from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)
Patchnames
SUSE-SLE-Live-Patching-12-2017-1264
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.59-92_24 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n\nThe following non-security bug was fixed:\n\n- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON\u0027s from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2017-1264",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2066-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2066-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172066-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2066-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html"
},
{
"category": "self",
"summary": "SUSE Bug 1038564",
"url": "https://bugzilla.suse.com/1038564"
},
{
"category": "self",
"summary": "SUSE Bug 1042364",
"url": "https://bugzilla.suse.com/1042364"
},
{
"category": "self",
"summary": "SUSE Bug 1042892",
"url": "https://bugzilla.suse.com/1042892"
},
{
"category": "self",
"summary": "SUSE Bug 1046191",
"url": "https://bugzilla.suse.com/1046191"
},
{
"category": "self",
"summary": "SUSE Bug 1046202",
"url": "https://bugzilla.suse.com/1046202"
},
{
"category": "self",
"summary": "SUSE Bug 1046206",
"url": "https://bugzilla.suse.com/1046206"
},
{
"category": "self",
"summary": "SUSE Bug 1047518",
"url": "https://bugzilla.suse.com/1047518"
},
{
"category": "self",
"summary": "SUSE Bug 1050751",
"url": "https://bugzilla.suse.com/1050751"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7533 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8797 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8890 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9242 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9242/"
}
],
"title": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP2",
"tracking": {
"current_release_date": "2017-08-07T08:08:06Z",
"generator": {
"date": "2017-08-07T08:08:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2066-1",
"initial_release_date": "2017-08-07T08:08:06Z",
"revision_history": [
{
"date": "2017-08-07T08:08:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7533"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7533",
"url": "https://www.suse.com/security/cve/CVE-2017-7533"
},
{
"category": "external",
"summary": "SUSE Bug 1049483 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1049483"
},
{
"category": "external",
"summary": "SUSE Bug 1050677 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1050677"
},
{
"category": "external",
"summary": "SUSE Bug 1050751 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1050751"
},
{
"category": "external",
"summary": "SUSE Bug 1053919 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1053919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-7533"
},
{
"cve": "CVE-2017-7645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7645"
}
],
"notes": [
{
"category": "general",
"text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7645",
"url": "https://www.suse.com/security/cve/CVE-2017-7645"
},
{
"category": "external",
"summary": "SUSE Bug 1034670 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1034670"
},
{
"category": "external",
"summary": "SUSE Bug 1036741 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1036741"
},
{
"category": "external",
"summary": "SUSE Bug 1046191 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1046191"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-7645",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-7645"
},
{
"cve": "CVE-2017-8797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8797"
}
],
"notes": [
{
"category": "general",
"text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8797",
"url": "https://www.suse.com/security/cve/CVE-2017-8797"
},
{
"category": "external",
"summary": "SUSE Bug 1046202 for CVE-2017-8797",
"url": "https://bugzilla.suse.com/1046202"
},
{
"category": "external",
"summary": "SUSE Bug 1046206 for CVE-2017-8797",
"url": "https://bugzilla.suse.com/1046206"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-8797"
},
{
"cve": "CVE-2017-8890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8890"
}
],
"notes": [
{
"category": "general",
"text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8890",
"url": "https://www.suse.com/security/cve/CVE-2017-8890"
},
{
"category": "external",
"summary": "SUSE Bug 1038544 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1038544"
},
{
"category": "external",
"summary": "SUSE Bug 1038564 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1038564"
},
{
"category": "external",
"summary": "SUSE Bug 1039883 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1039883"
},
{
"category": "external",
"summary": "SUSE Bug 1039885 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1039885"
},
{
"category": "external",
"summary": "SUSE Bug 1040069 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1040069"
},
{
"category": "external",
"summary": "SUSE Bug 1042364 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1042364"
},
{
"category": "external",
"summary": "SUSE Bug 1051906 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1051906"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8890",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-8890"
},
{
"cve": "CVE-2017-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9077"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9077",
"url": "https://www.suse.com/security/cve/CVE-2017-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1038544 for CVE-2017-9077",
"url": "https://bugzilla.suse.com/1038544"
},
{
"category": "external",
"summary": "SUSE Bug 1040069 for CVE-2017-9077",
"url": "https://bugzilla.suse.com/1040069"
},
{
"category": "external",
"summary": "SUSE Bug 1042364 for CVE-2017-9077",
"url": "https://bugzilla.suse.com/1042364"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-9077",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-9077"
},
{
"cve": "CVE-2017-9242",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9242"
}
],
"notes": [
{
"category": "general",
"text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9242",
"url": "https://www.suse.com/security/cve/CVE-2017-9242"
},
{
"category": "external",
"summary": "SUSE Bug 1041431 for CVE-2017-9242",
"url": "https://bugzilla.suse.com/1041431"
},
{
"category": "external",
"summary": "SUSE Bug 1042892 for CVE-2017-9242",
"url": "https://bugzilla.suse.com/1042892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-07T08:08:06Z",
"details": "important"
}
],
"title": "CVE-2017-9242"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…