CVE-2025-37833 (GCVE-0-2025-37833)
Vulnerability from cvelistv5
Published
2025-05-08 06:26
Modified
2025-05-26 05:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads Fix niu_try_msix() to not cause a fatal trap on sparc systems. Set PCI_DEV_FLAGS_MSIX_TOUCH_ENTRY_DATA_FIRST on the struct pci_dev to work around a bug in the hardware or firmware. For each vector entry in the msix table, niu chips will cause a fatal trap if any registers in that entry are read before that entries' ENTRY_DATA register is written to. Testing indicates writes to other registers are not sufficient to prevent the fatal trap, however the value does not appear to matter. This only needs to happen once after power up, so simply rebooting into a kernel lacking this fix will NOT cause the trap. NON-RESUMABLE ERROR: Reporting on cpu 64 NON-RESUMABLE ERROR: TPC [0x00000000005f6900] <msix_prepare_msi_desc+0x90/0xa0> NON-RESUMABLE ERROR: RAW [4010000000000016:00000e37f93e32ff:0000000202000080:ffffffffffffffff NON-RESUMABLE ERROR: 0000000800000000:0000000000000000:0000000000000000:0000000000000000] NON-RESUMABLE ERROR: handle [0x4010000000000016] stick [0x00000e37f93e32ff] NON-RESUMABLE ERROR: type [precise nonresumable] NON-RESUMABLE ERROR: attrs [0x02000080] < ASI sp-faulted priv > NON-RESUMABLE ERROR: raddr [0xffffffffffffffff] NON-RESUMABLE ERROR: insn effective address [0x000000c50020000c] NON-RESUMABLE ERROR: size [0x8] NON-RESUMABLE ERROR: asi [0x00] CPU: 64 UID: 0 PID: 745 Comm: kworker/64:1 Not tainted 6.11.5 #63 Workqueue: events work_for_cpu_fn TSTATE: 0000000011001602 TPC: 00000000005f6900 TNPC: 00000000005f6904 Y: 00000000 Not tainted TPC: <msix_prepare_msi_desc+0x90/0xa0> g0: 00000000000002e9 g1: 000000000000000c g2: 000000c50020000c g3: 0000000000000100 g4: ffff8000470307c0 g5: ffff800fec5be000 g6: ffff800047a08000 g7: 0000000000000000 o0: ffff800014feb000 o1: ffff800047a0b620 o2: 0000000000000011 o3: ffff800047a0b620 o4: 0000000000000080 o5: 0000000000000011 sp: ffff800047a0ad51 ret_pc: 00000000005f7128 RPC: <__pci_enable_msix_range+0x3cc/0x460> l0: 000000000000000d l1: 000000000000c01f l2: ffff800014feb0a8 l3: 0000000000000020 l4: 000000000000c000 l5: 0000000000000001 l6: 0000000020000000 l7: ffff800047a0b734 i0: ffff800014feb000 i1: ffff800047a0b730 i2: 0000000000000001 i3: 000000000000000d i4: 0000000000000000 i5: 0000000000000000 i6: ffff800047a0ae81 i7: 00000000101888b0 I7: <niu_try_msix.constprop.0+0xc0/0x130 [niu]> Call Trace: [<00000000101888b0>] niu_try_msix.constprop.0+0xc0/0x130 [niu] [<000000001018f840>] niu_get_invariants+0x183c/0x207c [niu] [<00000000101902fc>] niu_pci_init_one+0x27c/0x2fc [niu] [<00000000005ef3e4>] local_pci_probe+0x28/0x74 [<0000000000469240>] work_for_cpu_fn+0x8/0x1c [<000000000046b008>] process_scheduled_works+0x144/0x210 [<000000000046b518>] worker_thread+0x13c/0x1c0 [<00000000004710e0>] kthread+0xb8/0xc8 [<00000000004060c8>] ret_from_fork+0x1c/0x2c [<0000000000000000>] 0x0 Kernel panic - not syncing: Non-resumable error.
Impacted products
Vendor Product Version
Linux Linux Version: 7d5ec3d3612396dc6d4b76366d20ab9fc06f399f
Version: 7d5ec3d3612396dc6d4b76366d20ab9fc06f399f
Version: 7d5ec3d3612396dc6d4b76366d20ab9fc06f399f
Version: e6454fd429b0ba6513ac1de27a0bd6ccac021a40
Version: 3590d16b47ac561a4f2504befe43def10ed1814c
Version: e1d5e8a561baaafed6e35d72a6ad53d248580d6c
Version: 3b570884c868c12e3184627ce4b4a167e9d6f018
Version: 1866c8f6d43c3c6ffa2bfe086b65392b3a3fafb1
Version: aa8092c1d1f142f797995d0448afb73a5148f4ae
Version: 6c971252f09040af40d20851cf4e14018e6710d9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/sun/niu.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c187aaa9e79b4b6d86ac7ba941e579ad33df5538",
              "status": "affected",
              "version": "7d5ec3d3612396dc6d4b76366d20ab9fc06f399f",
              "versionType": "git"
            },
            {
              "lessThan": "64903e4849a71cf7f7c7e5d45225ccefc1280929",
              "status": "affected",
              "version": "7d5ec3d3612396dc6d4b76366d20ab9fc06f399f",
              "versionType": "git"
            },
            {
              "lessThan": "fbb429ddff5c8e479edcc7dde5a542c9295944e6",
              "status": "affected",
              "version": "7d5ec3d3612396dc6d4b76366d20ab9fc06f399f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e6454fd429b0ba6513ac1de27a0bd6ccac021a40",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3590d16b47ac561a4f2504befe43def10ed1814c",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e1d5e8a561baaafed6e35d72a6ad53d248580d6c",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3b570884c868c12e3184627ce4b4a167e9d6f018",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "1866c8f6d43c3c6ffa2bfe086b65392b3a3fafb1",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "aa8092c1d1f142f797995d0448afb73a5148f4ae",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "6c971252f09040af40d20851cf4e14018e6710d9",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/sun/niu.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.14"
            },
            {
              "lessThan": "5.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.26",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.26",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.5",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.282",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.281",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.245",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.205",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.4.142",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.10.60",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.13.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads\n\nFix niu_try_msix() to not cause a fatal trap on sparc systems.\n\nSet PCI_DEV_FLAGS_MSIX_TOUCH_ENTRY_DATA_FIRST on the struct pci_dev to\nwork around a bug in the hardware or firmware.\n\nFor each vector entry in the msix table, niu chips will cause a fatal\ntrap if any registers in that entry are read before that entries\u0027\nENTRY_DATA register is written to. Testing indicates writes to other\nregisters are not sufficient to prevent the fatal trap, however the value\ndoes not appear to matter. This only needs to happen once after power up,\nso simply rebooting into a kernel lacking this fix will NOT cause the\ntrap.\n\nNON-RESUMABLE ERROR: Reporting on cpu 64\nNON-RESUMABLE ERROR: TPC [0x00000000005f6900] \u003cmsix_prepare_msi_desc+0x90/0xa0\u003e\nNON-RESUMABLE ERROR: RAW [4010000000000016:00000e37f93e32ff:0000000202000080:ffffffffffffffff\nNON-RESUMABLE ERROR:      0000000800000000:0000000000000000:0000000000000000:0000000000000000]\nNON-RESUMABLE ERROR: handle [0x4010000000000016] stick [0x00000e37f93e32ff]\nNON-RESUMABLE ERROR: type [precise nonresumable]\nNON-RESUMABLE ERROR: attrs [0x02000080] \u003c ASI sp-faulted priv \u003e\nNON-RESUMABLE ERROR: raddr [0xffffffffffffffff]\nNON-RESUMABLE ERROR: insn effective address [0x000000c50020000c]\nNON-RESUMABLE ERROR: size [0x8]\nNON-RESUMABLE ERROR: asi [0x00]\nCPU: 64 UID: 0 PID: 745 Comm: kworker/64:1 Not tainted 6.11.5 #63\nWorkqueue: events work_for_cpu_fn\nTSTATE: 0000000011001602 TPC: 00000000005f6900 TNPC: 00000000005f6904 Y: 00000000    Not tainted\nTPC: \u003cmsix_prepare_msi_desc+0x90/0xa0\u003e\ng0: 00000000000002e9 g1: 000000000000000c g2: 000000c50020000c g3: 0000000000000100\ng4: ffff8000470307c0 g5: ffff800fec5be000 g6: ffff800047a08000 g7: 0000000000000000\no0: ffff800014feb000 o1: ffff800047a0b620 o2: 0000000000000011 o3: ffff800047a0b620\no4: 0000000000000080 o5: 0000000000000011 sp: ffff800047a0ad51 ret_pc: 00000000005f7128\nRPC: \u003c__pci_enable_msix_range+0x3cc/0x460\u003e\nl0: 000000000000000d l1: 000000000000c01f l2: ffff800014feb0a8 l3: 0000000000000020\nl4: 000000000000c000 l5: 0000000000000001 l6: 0000000020000000 l7: ffff800047a0b734\ni0: ffff800014feb000 i1: ffff800047a0b730 i2: 0000000000000001 i3: 000000000000000d\ni4: 0000000000000000 i5: 0000000000000000 i6: ffff800047a0ae81 i7: 00000000101888b0\nI7: \u003cniu_try_msix.constprop.0+0xc0/0x130 [niu]\u003e\nCall Trace:\n[\u003c00000000101888b0\u003e] niu_try_msix.constprop.0+0xc0/0x130 [niu]\n[\u003c000000001018f840\u003e] niu_get_invariants+0x183c/0x207c [niu]\n[\u003c00000000101902fc\u003e] niu_pci_init_one+0x27c/0x2fc [niu]\n[\u003c00000000005ef3e4\u003e] local_pci_probe+0x28/0x74\n[\u003c0000000000469240\u003e] work_for_cpu_fn+0x8/0x1c\n[\u003c000000000046b008\u003e] process_scheduled_works+0x144/0x210\n[\u003c000000000046b518\u003e] worker_thread+0x13c/0x1c0\n[\u003c00000000004710e0\u003e] kthread+0xb8/0xc8\n[\u003c00000000004060c8\u003e] ret_from_fork+0x1c/0x2c\n[\u003c0000000000000000\u003e] 0x0\nKernel panic - not syncing: Non-resumable error."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-26T05:21:54.880Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c187aaa9e79b4b6d86ac7ba941e579ad33df5538"
        },
        {
          "url": "https://git.kernel.org/stable/c/64903e4849a71cf7f7c7e5d45225ccefc1280929"
        },
        {
          "url": "https://git.kernel.org/stable/c/fbb429ddff5c8e479edcc7dde5a542c9295944e6"
        }
      ],
      "title": "net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-37833",
    "datePublished": "2025-05-08T06:26:23.821Z",
    "dateReserved": "2025-04-16T04:51:23.951Z",
    "dateUpdated": "2025-05-26T05:21:54.880Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-37833\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-08T07:15:54.533\",\"lastModified\":\"2025-05-08T14:39:09.683\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads\\n\\nFix niu_try_msix() to not cause a fatal trap on sparc systems.\\n\\nSet PCI_DEV_FLAGS_MSIX_TOUCH_ENTRY_DATA_FIRST on the struct pci_dev to\\nwork around a bug in the hardware or firmware.\\n\\nFor each vector entry in the msix table, niu chips will cause a fatal\\ntrap if any registers in that entry are read before that entries\u0027\\nENTRY_DATA register is written to. Testing indicates writes to other\\nregisters are not sufficient to prevent the fatal trap, however the value\\ndoes not appear to matter. This only needs to happen once after power up,\\nso simply rebooting into a kernel lacking this fix will NOT cause the\\ntrap.\\n\\nNON-RESUMABLE ERROR: Reporting on cpu 64\\nNON-RESUMABLE ERROR: TPC [0x00000000005f6900] \u003cmsix_prepare_msi_desc+0x90/0xa0\u003e\\nNON-RESUMABLE ERROR: RAW [4010000000000016:00000e37f93e32ff:0000000202000080:ffffffffffffffff\\nNON-RESUMABLE ERROR:      0000000800000000:0000000000000000:0000000000000000:0000000000000000]\\nNON-RESUMABLE ERROR: handle [0x4010000000000016] stick [0x00000e37f93e32ff]\\nNON-RESUMABLE ERROR: type [precise nonresumable]\\nNON-RESUMABLE ERROR: attrs [0x02000080] \u003c ASI sp-faulted priv \u003e\\nNON-RESUMABLE ERROR: raddr [0xffffffffffffffff]\\nNON-RESUMABLE ERROR: insn effective address [0x000000c50020000c]\\nNON-RESUMABLE ERROR: size [0x8]\\nNON-RESUMABLE ERROR: asi [0x00]\\nCPU: 64 UID: 0 PID: 745 Comm: kworker/64:1 Not tainted 6.11.5 #63\\nWorkqueue: events work_for_cpu_fn\\nTSTATE: 0000000011001602 TPC: 00000000005f6900 TNPC: 00000000005f6904 Y: 00000000    Not tainted\\nTPC: \u003cmsix_prepare_msi_desc+0x90/0xa0\u003e\\ng0: 00000000000002e9 g1: 000000000000000c g2: 000000c50020000c g3: 0000000000000100\\ng4: ffff8000470307c0 g5: ffff800fec5be000 g6: ffff800047a08000 g7: 0000000000000000\\no0: ffff800014feb000 o1: ffff800047a0b620 o2: 0000000000000011 o3: ffff800047a0b620\\no4: 0000000000000080 o5: 0000000000000011 sp: ffff800047a0ad51 ret_pc: 00000000005f7128\\nRPC: \u003c__pci_enable_msix_range+0x3cc/0x460\u003e\\nl0: 000000000000000d l1: 000000000000c01f l2: ffff800014feb0a8 l3: 0000000000000020\\nl4: 000000000000c000 l5: 0000000000000001 l6: 0000000020000000 l7: ffff800047a0b734\\ni0: ffff800014feb000 i1: ffff800047a0b730 i2: 0000000000000001 i3: 000000000000000d\\ni4: 0000000000000000 i5: 0000000000000000 i6: ffff800047a0ae81 i7: 00000000101888b0\\nI7: \u003cniu_try_msix.constprop.0+0xc0/0x130 [niu]\u003e\\nCall Trace:\\n[\u003c00000000101888b0\u003e] niu_try_msix.constprop.0+0xc0/0x130 [niu]\\n[\u003c000000001018f840\u003e] niu_get_invariants+0x183c/0x207c [niu]\\n[\u003c00000000101902fc\u003e] niu_pci_init_one+0x27c/0x2fc [niu]\\n[\u003c00000000005ef3e4\u003e] local_pci_probe+0x28/0x74\\n[\u003c0000000000469240\u003e] work_for_cpu_fn+0x8/0x1c\\n[\u003c000000000046b008\u003e] process_scheduled_works+0x144/0x210\\n[\u003c000000000046b518\u003e] worker_thread+0x13c/0x1c0\\n[\u003c00000000004710e0\u003e] kthread+0xb8/0xc8\\n[\u003c00000000004060c8\u003e] ret_from_fork+0x1c/0x2c\\n[\u003c0000000000000000\u003e] 0x0\\nKernel panic - not syncing: Non-resumable error.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/niu: Niu requiere que los campos ENTRY_DATA de MSIX se toquen antes de leer la entrada. Corrija niu_try_msix() para que no cause una trampa fatal en sistemas sparc. Establezca PCI_DEV_FLAGS_MSIX_TOUCH_ENTRY_DATA_FIRST en la estructura pci_dev para solucionar un error en el hardware o firmware. Para cada entrada de vector en la tabla msix, los chips niu causar\u00e1n una trampa fatal si se lee alg\u00fan registro en esa entrada antes de que se escriba en el registro ENTRY_DATA de esa entrada. Las pruebas indican que las escrituras en otros registros no son suficientes para evitar la trampa fatal; sin embargo, el valor no parece importar. Esto solo necesita suceder una vez despu\u00e9s del encendido, por lo que simplemente reiniciar en un kernel que no tenga esta correcci\u00f3n NO causar\u00e1 la trampa. ERROR NO REANUDABLE: Informe de CPU 64 ERROR NO REANUDABLE: TPC [0x00000000005f6900]  ERROR NO REANUDABLE: RAW [4010000000000016:00000e37f93e32ff:0000000202000080:ffffffffffffffff ERROR NO REANUDABLE: 0000000800000000:00000000000000000:00000000000000000:00000000000000000] ERROR NO REANUDABLE: handle [0x4010000000000016] stick [0x00000e37f93e32ff] ERROR NO REANUDABLE: tipo [precise nonresumable] ERROR NO REANUDABLE: attrs [0x02000080] \u0026lt; ASI sp-faulted priv \u0026gt; ERROR NO REANUDABLE: raddr [0xffffffffffffffff] ERROR NO REANUDABLE: direcci\u00f3n efectiva insn [0x000000c50020000c] ERROR NO REANUDABLE: tama\u00f1o [0x8] ERROR NO REANUDABLE: asi [0x00] CPU: 64 UID: 0 PID: 745 Comm: kworker/64:1 No contaminado 6.11.5 #63 Cola de trabajo: eventos work_for_cpu_fn TSTATE: 0000000011001602 TPC: 00000000005f6900 TNPC: 00000000005f6904 Y: 00000000 No contaminado TPC:  g0: 00000000000002e9 g1: 000000000000000c g2: 000000c50020000c g3: 0000000000000100 g4: ffff8000470307c0 g5: ffff800fec5be000 g6: ffff800047a08000 g7: 0000000000000000 o0: ffff800014feb000 o1: ffff800047a0b620 o2: 0000000000000011 o3: ffff800047a0b620 o4: 0000000000000080 o5: 0000000000000011 sp: ffff800047a0ad51 ret_pc: 00000000005f7128 RPC: \u0026lt;__pci_enable_msix_range+0x3cc/0x460\u0026gt; l0: 00000000000000d l1: 000000000000c01f l2: ffff800014feb0a8 l3: 0000000000000020 l4: 000000000000c000 l5: 0000000000000001 l6: 0000000020000000 l7: ffff800047a0b734 i0: ffff800014feb000 i1: ffff800047a0b730 i2: 0000000000000001 i3: 000000000000000d i4: 000000000000000000000000000000000000000000 i6: ffff800047a0ae81 i7: 00000000101888b0 I7:  Rastreo de llamadas: [\u0026lt;00000000101888b0\u0026gt;] niu_try_msix.constprop.0+0xc0/0x130 [niu] [\u0026lt;000000001018f840\u0026gt;] niu_get_invariants+0x183c/0x207c [niu] [\u0026lt;00000000101902fc\u0026gt;] niu_pci_init_one+0x27c/0x2fc [niu] [\u0026lt;00000000005ef3e4\u0026gt;] local_pci_probe+0x28/0x74 [\u0026lt;0000000000469240\u0026gt;] work_for_cpu_fn+0x8/0x1c [\u0026lt;000000000046b008\u0026gt;] process_scheduled_works+0x144/0x210 [\u0026lt;000000000046b518\u0026gt;] workers_thread+0x13c/0x1c0 [\u0026lt;00000000004710e0\u0026gt;] kthread+0xb8/0xc8 [\u0026lt;00000000004060c8\u0026gt;] ret_from_fork+0x1c/0x2c [\u0026lt;0000000000000000\u0026gt;] 0x0 P\u00e1nico del kernel: no se sincroniza: Error no reanudable.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/64903e4849a71cf7f7c7e5d45225ccefc1280929\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c187aaa9e79b4b6d86ac7ba941e579ad33df5538\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fbb429ddff5c8e479edcc7dde5a542c9295944e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…