cve-2021-47180
Vulnerability from cvelistv5
Published
2024-03-25 09:16
Modified
2024-12-19 07:36
Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
NFC: nci: fix memory leak in nci_allocate_device
nfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.
Fix this by freeing hci_dev in nci_free_device.
BUG: memory leak
unreferenced object 0xffff888111ea6800 (size 1024):
comm "kworker/1:0", pid 19, jiffies 4294942308 (age 13.580s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<000000004bc25d43>] kmalloc include/linux/slab.h:552 [inline]
[<000000004bc25d43>] kzalloc include/linux/slab.h:682 [inline]
[<000000004bc25d43>] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784
[<00000000c59cff92>] nci_allocate_device net/nfc/nci/core.c:1170 [inline]
[<00000000c59cff92>] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132
[<00000000006e0a8e>] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153
[<000000004da1b57e>] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345
[<00000000d506aed9>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
[<00000000bc632c92>] really_probe+0x159/0x4a0 drivers/base/dd.c:554
[<00000000f5009125>] driver_probe_device+0x84/0x100 drivers/base/dd.c:740
[<000000000ce658ca>] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846
[<000000007067d05f>] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431
[<00000000f8e13372>] __device_attach+0x122/0x250 drivers/base/dd.c:914
[<000000009cf68860>] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491
[<00000000359c965a>] device_add+0x5be/0xc30 drivers/base/core.c:3109
[<00000000086e4bd3>] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164
[<00000000ca036872>] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238
[<00000000d40d36f6>] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293
[<00000000bc632c92>] really_probe+0x159/0x4a0 drivers/base/dd.c:554
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 Version: 11f54f228643d0248ec00ce8c9fb8d872f87e7b8 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-47180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-25T13:48:55.834173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:15:05.970Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T05:32:07.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "include/net/nfc/nci_core.h", "net/nfc/nci/core.c", "net/nfc/nci/hci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "448a1cb12977f52142e6feb12022c59662d88dc1", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "4a621621c7af3cec21c47c349b30cd9c3cea11c8", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "2c2fb2df46ea866b49fea5ec7112ec3cd4896c74", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "0365701bc44e078682ee1224866a71897495c7ef", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "af2a4426baf71163c0c354580ae98c7888a9aba7", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "b34cb7ac32cc8e5471dc773180ea9ae676b1a745", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "65234f50a90b64b335cbb9164b8a98c2a0d031dd", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" }, { "lessThan": "e0652f8bb44d6294eeeac06d703185357f25d50b", "status": "affected", "version": "11f54f228643d0248ec00ce8c9fb8d872f87e7b8", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "include/net/nfc/nci_core.h", "net/nfc/nci/core.c", "net/nfc/nci/hci.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.0" }, { "lessThan": "4.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.4.*", "status": "unaffected", "version": "4.4.271", "versionType": "semver" }, { "lessThanOrEqual": "4.9.*", "status": "unaffected", "version": "4.9.271", "versionType": "semver" }, { "lessThanOrEqual": "4.14.*", "status": "unaffected", "version": "4.14.235", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.193", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.123", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.41", "versionType": "semver" }, { "lessThanOrEqual": "5.12.*", "status": "unaffected", "version": "5.12.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.13", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: fix memory leak in nci_allocate_device\n\nnfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.\nFix this by freeing hci_dev in nci_free_device.\n\nBUG: memory leak\nunreferenced object 0xffff888111ea6800 (size 1024):\n comm \"kworker/1:0\", pid 19, jiffies 4294942308 (age 13.580s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`......\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c000000004bc25d43\u003e] kmalloc include/linux/slab.h:552 [inline]\n [\u003c000000004bc25d43\u003e] kzalloc include/linux/slab.h:682 [inline]\n [\u003c000000004bc25d43\u003e] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784\n [\u003c00000000c59cff92\u003e] nci_allocate_device net/nfc/nci/core.c:1170 [inline]\n [\u003c00000000c59cff92\u003e] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132\n [\u003c00000000006e0a8e\u003e] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153\n [\u003c000000004da1b57e\u003e] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345\n [\u003c00000000d506aed9\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [\u003c00000000bc632c92\u003e] really_probe+0x159/0x4a0 drivers/base/dd.c:554\n [\u003c00000000f5009125\u003e] driver_probe_device+0x84/0x100 drivers/base/dd.c:740\n [\u003c000000000ce658ca\u003e] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846\n [\u003c000000007067d05f\u003e] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431\n [\u003c00000000f8e13372\u003e] __device_attach+0x122/0x250 drivers/base/dd.c:914\n [\u003c000000009cf68860\u003e] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491\n [\u003c00000000359c965a\u003e] device_add+0x5be/0xc30 drivers/base/core.c:3109\n [\u003c00000000086e4bd3\u003e] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164\n [\u003c00000000ca036872\u003e] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n [\u003c00000000d40d36f6\u003e] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293\n [\u003c00000000bc632c92\u003e] really_probe+0x159/0x4a0 drivers/base/dd.c:554" } ], "providerMetadata": { "dateUpdated": "2024-12-19T07:36:54.966Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1" }, { "url": "https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8" }, { "url": "https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74" }, { "url": "https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef" }, { "url": "https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7" }, { "url": "https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745" }, { "url": "https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd" }, { "url": "https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b" } ], "title": "NFC: nci: fix memory leak in nci_allocate_device", "x_generator": { "engine": "bippy-5f407fcff5a0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2021-47180", "datePublished": "2024-03-25T09:16:29.580Z", "dateReserved": "2024-03-25T09:12:14.112Z", "dateUpdated": "2024-12-19T07:36:54.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-47180\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-25T10:15:09.363\",\"lastModified\":\"2024-11-21T06:35:34.167\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nNFC: nci: fix memory leak in nci_allocate_device\\n\\nnfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.\\nFix this by freeing hci_dev in nci_free_device.\\n\\nBUG: memory leak\\nunreferenced object 0xffff888111ea6800 (size 1024):\\n comm \\\"kworker/1:0\\\", pid 19, jiffies 4294942308 (age 13.580s)\\n hex dump (first 32 bytes):\\n 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`......\\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\\n backtrace:\\n [\u003c000000004bc25d43\u003e] kmalloc include/linux/slab.h:552 [inline]\\n [\u003c000000004bc25d43\u003e] kzalloc include/linux/slab.h:682 [inline]\\n [\u003c000000004bc25d43\u003e] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784\\n [\u003c00000000c59cff92\u003e] nci_allocate_device net/nfc/nci/core.c:1170 [inline]\\n [\u003c00000000c59cff92\u003e] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132\\n [\u003c00000000006e0a8e\u003e] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153\\n [\u003c000000004da1b57e\u003e] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345\\n [\u003c00000000d506aed9\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\\n [\u003c00000000bc632c92\u003e] really_probe+0x159/0x4a0 drivers/base/dd.c:554\\n [\u003c00000000f5009125\u003e] driver_probe_device+0x84/0x100 drivers/base/dd.c:740\\n [\u003c000000000ce658ca\u003e] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846\\n [\u003c000000007067d05f\u003e] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431\\n [\u003c00000000f8e13372\u003e] __device_attach+0x122/0x250 drivers/base/dd.c:914\\n [\u003c000000009cf68860\u003e] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491\\n [\u003c00000000359c965a\u003e] device_add+0x5be/0xc30 drivers/base/core.c:3109\\n [\u003c00000000086e4bd3\u003e] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164\\n [\u003c00000000ca036872\u003e] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\\n [\u003c00000000d40d36f6\u003e] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293\\n [\u003c00000000bc632c92\u003e] really_probe+0x159/0x4a0 drivers/base/dd.c:554\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: NFC: nci: corrige la p\u00e9rdida de memoria en nci_allocate_device nfcmrvl_disconnect no logra liberar el campo hci_dev en la estructura nci_dev. Solucione este problema liberando hci_dev en nci_free_device. ERROR: p\u00e9rdida de memoria, objeto sin referencia 0xffff888111ea6800 (tama\u00f1o 1024): comunicaci\u00f3n \\\"kworker/1:0\\\", pid 19, jiffies 4294942308 (edad 13.580 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............. ... seguimiento: [\u0026lt;000000004bc25d43\u0026gt;] kmalloc include/linux/slab.h:552 [en l\u00ednea] [\u0026lt;000000004bc25d43\u0026gt;] kzalloc include/linux/slab.h:682 [en l\u00ednea] [\u0026lt;000000004bc25d43\u0026gt;] nci_hci_allocate+0x21/ 0xd0 net/nfc/nci/hci.c:784 [\u0026lt;00000000c59cff92\u0026gt;] nci_allocate_device net/nfc/nci/core.c:1170 [en l\u00ednea] [\u0026lt;00000000c59cff92\u0026gt;] nci_allocate_device+0x10b/0x160 net/nfc/nci/core. c:1132 [\u0026lt;00000000006e0a8e\u0026gt;] nfcmrvl_nci_register_dev+0x10a/0x1c0 controladores/nfc/nfcmrvl/main.c:153 [\u0026lt;000000004da1b57e\u0026gt;] nfcmrvl_probe+0x223/0x290 controladores/nfc/nfcmr vl/usb.c:345 [\u0026lt;00000000d506aed9\u0026gt;] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [\u0026lt;00000000bc632c92\u0026gt;] very_probe+0x159/0x4a0 drivers/base/dd.c:554 [\u0026lt;00000000f5009125\u0026gt;] driver_probe_device+0x84/0x100 drivers/base/dd .c:740 [\u0026lt;000000000ce658ca\u0026gt;] __device_attach_driver+0xee/0x110 controladores/base/dd.c:846 [\u0026lt;000000007067d05f\u0026gt;] bus_for_each_drv+0xb7/0x100 controladores/base/bus.c:431 [\u0026lt;00000000f8e1337 2\u0026gt;] __device_attach+0x122 /0x250 controladores/base/dd.c:914 [\u0026lt;000000009cf68860\u0026gt;] bus_probe_device+0xc6/0xe0 controladores/base/bus.c:491 [\u0026lt;00000000359c965a\u0026gt;] dispositivo_add+0x5be/0xc30 controladores/base/core.c:3109 [ \u0026lt;00000000086e4bd3\u0026gt;] usb_set_configuration+0x9d9/0xb90 controladores/usb/core/message.c:2164 [\u0026lt;00000000ca036872\u0026gt;] usb_generic_driver_probe+0x8c/0xc0 controladores/usb/core/generic.c:238 [\u0026lt;00000000d40d3 6f6\u0026gt;] dispositivo_probe_usb+0x5c/ 0x140 controladores/usb/core/driver.c:293 [\u0026lt;00000000bc632c92\u0026gt;] very_probe+0x159/0x4a0 controladores/base/dd.c:554\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.