suse-su-2024:3567-1
Vulnerability from csaf_suse
Published
2024-10-09 09:46
Modified
2024-10-09 09:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-46695: selinux,smack: do not bypass permissions check in inode_setsecctx hook (bsc#1230519).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
The following non-security bugs were fixed:
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1230326).
- ext4: add reserved GDT blocks check (bsc#1230326).
- ext4: consolidate checks for resize of bigalloc into ext4_resize_begin (bsc#1230326).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1230326).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- No -rt specific changes this merge.
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- Revert 'ext4: consolidate checks for resize of bigalloc into ext4_resize_begin' (bsc#1230326).
Patchnames
SUSE-2024-3567,SUSE-SUSE-MicroOS-5.1-2024-3567,SUSE-SUSE-MicroOS-5.2-2024-3567
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398).\n- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633).\n- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).\n- CVE-2024-46695: selinux,smack: do not bypass permissions check in inode_setsecctx hook (bsc#1230519).\n- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).\n- CVE-2024-45003: Don\u0027t evict inode under the inode lru traversing context (bsc#1230245).\n\nThe following non-security bugs were fixed:\n\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1230326).\n- ext4: add reserved GDT blocks check (bsc#1230326).\n- ext4: consolidate checks for resize of bigalloc into ext4_resize_begin (bsc#1230326).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1230326).\n- kabi: add __nf_queue_get_refs() for kabi compliance.\n- No -rt specific changes this merge.\n- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).\n- Revert \u0027ext4: consolidate checks for resize of bigalloc into ext4_resize_begin\u0027 (bsc#1230326).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3567,SUSE-SUSE-MicroOS-5.1-2024-3567,SUSE-SUSE-MicroOS-5.2-2024-3567", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3567-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3567-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243567-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3567-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" }, { "category": "self", "summary": "SUSE Bug 1226666", "url": "https://bugzilla.suse.com/1226666" }, { "category": "self", "summary": "SUSE Bug 1227487", "url": "https://bugzilla.suse.com/1227487" }, { "category": "self", "summary": "SUSE Bug 1229633", "url": "https://bugzilla.suse.com/1229633" }, { "category": "self", "summary": "SUSE Bug 1230015", "url": "https://bugzilla.suse.com/1230015" }, { "category": "self", "summary": "SUSE Bug 1230245", "url": "https://bugzilla.suse.com/1230245" }, { "category": "self", "summary": "SUSE Bug 1230326", "url": "https://bugzilla.suse.com/1230326" }, { "category": "self", "summary": "SUSE Bug 1230398", "url": "https://bugzilla.suse.com/1230398" }, { "category": "self", "summary": "SUSE Bug 1230434", "url": "https://bugzilla.suse.com/1230434" }, { "category": "self", "summary": "SUSE Bug 1230519", "url": "https://bugzilla.suse.com/1230519" }, { "category": "self", "summary": "SUSE Bug 1230767", "url": "https://bugzilla.suse.com/1230767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48911 page", "url": "https://www.suse.com/security/cve/CVE-2022-48911/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48945 page", "url": "https://www.suse.com/security/cve/CVE-2022-48945/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44946 page", "url": "https://www.suse.com/security/cve/CVE-2024-44946/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45003 page", "url": "https://www.suse.com/security/cve/CVE-2024-45003/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45021 page", "url": "https://www.suse.com/security/cve/CVE-2024-45021/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-46695 page", "url": "https://www.suse.com/security/cve/CVE-2024-46695/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-46774 page", "url": "https://www.suse.com/security/cve/CVE-2024-46774/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-10-09T09:46:04Z", "generator": { "date": "2024-10-09T09:46:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3567-1", "initial_release_date": "2024-10-09T09:46:04Z", "revision_history": [ { "date": "2024-10-09T09:46:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.187.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.187.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.187.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.187.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.187.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.187.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.187.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.187.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.187.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.187.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.187.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.187.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.187.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.187.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.187.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.187.1.noarch as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.187.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.187.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.187.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.187.1.noarch as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.187.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-48911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48911" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_queue: fix possible use-after-free\n\nEric Dumazet says:\n The sock_hold() side seems suspect, because there is no guarantee\n that sk_refcnt is not already 0.\n\nOn failure, we cannot queue the packet and need to indicate an\nerror. The packet will be dropped by the caller.\n\nv2: split skb prefetch hunk into separate change", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48911", "url": "https://www.suse.com/security/cve/CVE-2022-48911" }, { "category": "external", "summary": "SUSE Bug 1229633 for CVE-2022-48911", "url": "https://bugzilla.suse.com/1229633" }, { "category": "external", "summary": "SUSE Bug 1229640 for CVE-2022-48911", "url": "https://bugzilla.suse.com/1229640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "important" } ], "title": "CVE-2022-48911" }, { "cve": "CVE-2022-48945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48945" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: fix compose size exceed boundary\n\nsyzkaller found a bug:\n\n BUG: unable to handle page fault for address: ffffc9000a3b1000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0\n Oops: 0002 [#1] PREEMPT SMP\n CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n RIP: 0010:memcpy_erms+0x6/0x10\n[...]\n Call Trace:\n \u003cTASK\u003e\n ? tpg_fill_plane_buffer+0x856/0x15b0\n vivid_fillbuff+0x8ac/0x1110\n vivid_thread_vid_cap_tick+0x361/0xc90\n vivid_thread_vid_cap+0x21a/0x3a0\n kthread+0x143/0x180\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nThis is because we forget to check boundary after adjust compose-\u003eheight\nint V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem\nfor this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48945", "url": "https://www.suse.com/security/cve/CVE-2022-48945" }, { "category": "external", "summary": "SUSE Bug 1230398 for CVE-2022-48945", "url": "https://bugzilla.suse.com/1230398" }, { "category": "external", "summary": "SUSE Bug 1235889 for CVE-2022-48945", "url": "https://bugzilla.suse.com/1235889" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "important" } ], "title": "CVE-2022-48945" }, { "cve": "CVE-2024-44946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44946" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: Serialise kcm_sendmsg() for the same socket.\n\nsyzkaller reported UAF in kcm_release(). [0]\n\nThe scenario is\n\n 1. Thread A builds a skb with MSG_MORE and sets kcm-\u003eseq_skb.\n\n 2. Thread A resumes building skb from kcm-\u003eseq_skb but is blocked\n by sk_stream_wait_memory()\n\n 3. Thread B calls sendmsg() concurrently, finishes building kcm-\u003eseq_skb\n and puts the skb to the write queue\n\n 4. Thread A faces an error and finally frees skb that is already in the\n write queue\n\n 5. kcm_release() does double-free the skb in the write queue\n\nWhen a thread is building a MSG_MORE skb, another thread must not touch it.\n\nLet\u0027s add a per-sk mutex and serialise kcm_sendmsg().\n\n[0]:\nBUG: KASAN: slab-use-after-free in __skb_unlink include/linux/skbuff.h:2366 [inline]\nBUG: KASAN: slab-use-after-free in __skb_dequeue include/linux/skbuff.h:2385 [inline]\nBUG: KASAN: slab-use-after-free in __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]\nBUG: KASAN: slab-use-after-free in __skb_queue_purge include/linux/skbuff.h:3181 [inline]\nBUG: KASAN: slab-use-after-free in kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691\nRead of size 8 at addr ffff0000ced0fc80 by task syz-executor329/6167\n\nCPU: 1 PID: 6167 Comm: syz-executor329 Tainted: G B 6.8.0-rc5-syzkaller-g9abbc24128bc #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall trace:\n dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291\n show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x178/0x518 mm/kasan/report.c:488\n kasan_report+0xd8/0x138 mm/kasan/report.c:601\n __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381\n __skb_unlink include/linux/skbuff.h:2366 [inline]\n __skb_dequeue include/linux/skbuff.h:2385 [inline]\n __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]\n __skb_queue_purge include/linux/skbuff.h:3181 [inline]\n kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691\n __sock_release net/socket.c:659 [inline]\n sock_close+0xa4/0x1e8 net/socket.c:1421\n __fput+0x30c/0x738 fs/file_table.c:376\n ____fput+0x20/0x30 fs/file_table.c:404\n task_work_run+0x230/0x2e0 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x618/0x1f64 kernel/exit.c:871\n do_group_exit+0x194/0x22c kernel/exit.c:1020\n get_signal+0x1500/0x15ec kernel/signal.c:2893\n do_signal+0x23c/0x3b44 arch/arm64/kernel/signal.c:1249\n do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148\n exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline]\n exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline]\n el0_svc+0xac/0x168 arch/arm64/kernel/entry-common.c:713\n el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730\n el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598\n\nAllocated by task 6166:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x40/0x78 mm/kasan/common.c:68\n kasan_save_alloc_info+0x70/0x84 mm/kasan/generic.c:626\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_node+0x204/0x4c0 mm/slub.c:3903\n __alloc_skb+0x19c/0x3d8 net/core/skbuff.c:641\n alloc_skb include/linux/skbuff.h:1296 [inline]\n kcm_sendmsg+0x1d3c/0x2124 net/kcm/kcmsock.c:783\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_sendmsg+0x220/0x2c0 net/socket.c:768\n splice_to_socket+0x7cc/0xd58 fs/splice.c:889\n do_splice_from fs/splice.c:941 [inline]\n direct_splice_actor+0xec/0x1d8 fs/splice.c:1164\n splice_direct_to_actor+0x438/0xa0c fs/splice.c:1108\n do_splice_direct_actor \n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44946", "url": "https://www.suse.com/security/cve/CVE-2024-44946" }, { "category": "external", "summary": "SUSE Bug 1230015 for CVE-2024-44946", "url": "https://bugzilla.suse.com/1230015" }, { "category": "external", "summary": "SUSE Bug 1230016 for CVE-2024-44946", "url": "https://bugzilla.suse.com/1230016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "important" } ], "title": "CVE-2024-44946" }, { "cve": "CVE-2024-45003", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45003" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t evict inode under the inode lru traversing context\n\nThe inode reclaiming process(See function prune_icache_sb) collects all\nreclaimable inodes and mark them with I_FREEING flag at first, at that\ntime, other processes will be stuck if they try getting these inodes\n(See function find_inode_fast), then the reclaiming process destroy the\ninodes by function dispose_list(). Some filesystems(eg. ext4 with\nea_inode feature, ubifs with xattr) may do inode lookup in the inode\nevicting callback function, if the inode lookup is operated under the\ninode lru traversing context, deadlock problems may happen.\n\nCase 1: In function ext4_evict_inode(), the ea inode lookup could happen\n if ea_inode feature is enabled, the lookup process will be stuck\n\tunder the evicting context like this:\n\n 1. File A has inode i_reg and an ea inode i_ea\n 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru-\u003ei_ea\n 3. Then, following three processes running like this:\n\n PA PB\n echo 2 \u003e /proc/sys/vm/drop_caches\n shrink_slab\n prune_dcache_sb\n // i_reg is added into lru, lru-\u003ei_ea-\u003ei_reg\n prune_icache_sb\n list_lru_walk_one\n inode_lru_isolate\n i_ea-\u003ei_state |= I_FREEING // set inode state\n inode_lru_isolate\n __iget(i_reg)\n spin_unlock(\u0026i_reg-\u003ei_lock)\n spin_unlock(lru_lock)\n rm file A\n i_reg-\u003enlink = 0\n iput(i_reg) // i_reg-\u003enlink is 0, do evict\n ext4_evict_inode\n ext4_xattr_delete_inode\n ext4_xattr_inode_dec_ref_all\n ext4_xattr_inode_iget\n ext4_iget(i_ea-\u003ei_ino)\n iget_locked\n find_inode_fast\n __wait_on_freeing_inode(i_ea) ----\u2192 AA deadlock\n dispose_list // cannot be executed by prune_icache_sb\n wake_up_bit(\u0026i_ea-\u003ei_state)\n\nCase 2: In deleted inode writing function ubifs_jnl_write_inode(), file\n deleting process holds BASEHD\u0027s wbuf-\u003eio_mutex while getting the\n\txattr inode, which could race with inode reclaiming process(The\n reclaiming process could try locking BASEHD\u0027s wbuf-\u003eio_mutex in\n\tinode evicting function), then an ABBA deadlock problem would\n\thappen as following:\n\n 1. File A has inode ia and a xattr(with inode ixa), regular file B has\n inode ib and a xattr.\n 2. getfattr(A, xattr_buf) // ixa is added into lru // lru-\u003eixa\n 3. Then, following three processes running like this:\n\n PA PB PC\n echo 2 \u003e /proc/sys/vm/drop_caches\n shrink_slab\n prune_dcache_sb\n // ib and ia are added into lru, lru-\u003eixa-\u003eib-\u003eia\n prune_icache_sb\n list_lru_walk_one\n inode_lru_isolate\n ixa-\u003ei_state |= I_FREEING // set inode state\n inode_lru_isolate\n __iget(ib)\n spin_unlock(\u0026ib-\u003ei_lock)\n spin_unlock(lru_lock)\n rm file B\n ib-\u003enlink = 0\n rm file A\n iput(ia)\n ubifs_evict_inode(ia)\n ubifs_jnl_delete_inode(ia)\n ubifs_jnl_write_inode(ia)\n make_reservation(BASEHD) // Lock wbuf-\u003eio_mutex\n ubifs_iget(ixa-\u003ei_ino)\n iget_locked\n find_inode_fast\n __wait_on_freeing_inode(ixa)\n | iput(ib) // ib-\u003enlink is 0, do evict\n | ubifs_evict_inode\n | ubifs_jnl_delete_inode(ib)\n \u2193 ubifs_jnl_write_inode\n ABBA deadlock \u2190-----make_reservation(BASEHD)\n dispose_list // cannot be executed by prune_icache_sb\n wake_up_bit(\u0026ixa-\u003ei_state)\n\nFix the possible deadlock by using new inode state flag I_LRU_ISOLATING\nto pin the inode in memory while inode_lru_isolate(\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45003", "url": "https://www.suse.com/security/cve/CVE-2024-45003" }, { "category": "external", "summary": "SUSE Bug 1230245 for CVE-2024-45003", "url": "https://bugzilla.suse.com/1230245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "moderate" } ], "title": "CVE-2024-45003" }, { "cve": "CVE-2024-45021", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45021" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg_write_event_control(): fix a user-triggerable oops\n\nwe are *not* guaranteed that anything past the terminating NUL\nis mapped (let alone initialized with anything sane).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45021", "url": "https://www.suse.com/security/cve/CVE-2024-45021" }, { "category": "external", "summary": "SUSE Bug 1230434 for CVE-2024-45021", "url": "https://bugzilla.suse.com/1230434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "moderate" } ], "title": "CVE-2024-45021" }, { "cve": "CVE-2024-46695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-46695" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux,smack: don\u0027t bypass permissions check in inode_setsecctx hook\n\nMarek Gresko reports that the root user on an NFS client is able to\nchange the security labels on files on an NFS filesystem that is\nexported with root squashing enabled.\n\nThe end of the kerneldoc comment for __vfs_setxattr_noperm() states:\n\n * This function requires the caller to lock the inode\u0027s i_mutex before it\n * is executed. It also assumes that the caller will make the appropriate\n * permission checks.\n\nnfsd_setattr() does do permissions checking via fh_verify() and\nnfsd_permission(), but those don\u0027t do all the same permissions checks\nthat are done by security_inode_setxattr() and its related LSM hooks do.\n\nSince nfsd_setattr() is the only consumer of security_inode_setsecctx(),\nsimplest solution appears to be to replace the call to\n__vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This\nfixes the above issue and has the added benefit of causing nfsd to\nrecall conflicting delegations on a file when a client tries to change\nits security label.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-46695", "url": "https://www.suse.com/security/cve/CVE-2024-46695" }, { "category": "external", "summary": "SUSE Bug 1230519 for CVE-2024-46695", "url": "https://bugzilla.suse.com/1230519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "moderate" } ], "title": "CVE-2024-46695" }, { "cve": "CVE-2024-46774", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-46774" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()\n\nSmatch warns:\n\n arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential\n spectre issue \u0027args.args\u0027 [r] (local cap)\n\nThe \u0027nargs\u0027 and \u0027nret\u0027 locals come directly from a user-supplied\nbuffer and are used as indexes into a small stack-based array and as\ninputs to copy_to_user() after they are subject to bounds checks.\n\nUse array_index_nospec() after the bounds checks to clamp these values\nfor speculative execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-46774", "url": "https://www.suse.com/security/cve/CVE-2024-46774" }, { "category": "external", "summary": "SUSE Bug 1230767 for CVE-2024-46774", "url": "https://bugzilla.suse.com/1230767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.187.1.noarch", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.187.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.187.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-09T09:46:04Z", "details": "moderate" } ], "title": "CVE-2024-46774" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…