cve-2024-26600
Vulnerability from cvelistv5
Published
2024-02-24 14:56
Modified
2024-12-19 08:43
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP If the external phy working together with phy-omap-usb2 does not implement send_srp(), we may still attempt to call it. This can happen on an idle Ethernet gadget triggering a wakeup for example: configfs-gadget.g1 gadget.0: ECM Suspend configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup ... Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute ... PC is at 0x0 LR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc] ... musb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core] usb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether] eth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c dev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4 sch_direct_xmit from __dev_queue_xmit+0x334/0xd88 __dev_queue_xmit from arp_solicit+0xf0/0x268 arp_solicit from neigh_probe+0x54/0x7c neigh_probe from __neigh_event_send+0x22c/0x47c __neigh_event_send from neigh_resolve_output+0x14c/0x1c0 neigh_resolve_output from ip_finish_output2+0x1c8/0x628 ip_finish_output2 from ip_send_skb+0x40/0xd8 ip_send_skb from udp_send_skb+0x124/0x340 udp_send_skb from udp_sendmsg+0x780/0x984 udp_sendmsg from __sys_sendto+0xd8/0x158 __sys_sendto from ret_fast_syscall+0x0/0x58 Let's fix the issue by checking for send_srp() and set_vbus() before calling them. For USB peripheral only cases these both could be NULL.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6bPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36dPatch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6bPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36dPatch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462Patch
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3Patch
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Impacted products
Vendor Product Version
Linux Linux Version: 3.7
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26600",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-28T17:03:23.255963Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-28T17:03:34.995Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:19.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/phy/ti/phy-omap-usb2.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "486218c11e8d1c8f515a3bdd70d62203609d4b6b",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "8398d8d735ee93a04fb9e9f490e8cacd737e3bf5",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "be3b82e4871ba00e9b5d0ede92d396d579d7b3b3",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "8cc889b9dea0579726be9520fcc766077890b462",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "0430bfcd46657d9116a26cd377f112cbc40826a4",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "14ef61594a5a286ae0d493b8acbf9eac46fd04c4",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "396e17af6761b3cc9e6e4ca94b4de7f642bfece1",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            },
            {
              "lessThan": "7104ba0f1958adb250319e68a15eff89ec4fd36d",
              "status": "affected",
              "version": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/phy/ti/phy-omap-usb2.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.7"
            },
            {
              "lessThan": "3.7",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.307",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.269",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.210",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.149",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.78",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.7.*",
              "status": "unaffected",
              "version": "6.7.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.8",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP\n\nIf the external phy working together with phy-omap-usb2 does not implement\nsend_srp(), we may still attempt to call it. This can happen on an idle\nEthernet gadget triggering a wakeup for example:\n\nconfigfs-gadget.g1 gadget.0: ECM Suspend\nconfigfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup\n...\nUnable to handle kernel NULL pointer dereference at virtual address\n00000000 when execute\n...\nPC is at 0x0\nLR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]\n...\nmusb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]\nusb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]\neth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c\ndev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4\nsch_direct_xmit from __dev_queue_xmit+0x334/0xd88\n__dev_queue_xmit from arp_solicit+0xf0/0x268\narp_solicit from neigh_probe+0x54/0x7c\nneigh_probe from __neigh_event_send+0x22c/0x47c\n__neigh_event_send from neigh_resolve_output+0x14c/0x1c0\nneigh_resolve_output from ip_finish_output2+0x1c8/0x628\nip_finish_output2 from ip_send_skb+0x40/0xd8\nip_send_skb from udp_send_skb+0x124/0x340\nudp_send_skb from udp_sendmsg+0x780/0x984\nudp_sendmsg from __sys_sendto+0xd8/0x158\n__sys_sendto from ret_fast_syscall+0x0/0x58\n\nLet\u0027s fix the issue by checking for send_srp() and set_vbus() before\ncalling them. For USB peripheral only cases these both could be NULL."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:43:18.574Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b"
        },
        {
          "url": "https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5"
        },
        {
          "url": "https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3"
        },
        {
          "url": "https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462"
        },
        {
          "url": "https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4"
        },
        {
          "url": "https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1"
        },
        {
          "url": "https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d"
        }
      ],
      "title": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-26600",
    "datePublished": "2024-02-24T14:56:55.674Z",
    "dateReserved": "2024-02-19T14:20:24.128Z",
    "dateUpdated": "2024-12-19T08:43:18.574Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-26600\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-26T16:27:59.927\",\"lastModified\":\"2024-11-21T09:02:37.990\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP\\n\\nIf the external phy working together with phy-omap-usb2 does not implement\\nsend_srp(), we may still attempt to call it. This can happen on an idle\\nEthernet gadget triggering a wakeup for example:\\n\\nconfigfs-gadget.g1 gadget.0: ECM Suspend\\nconfigfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup\\n...\\nUnable to handle kernel NULL pointer dereference at virtual address\\n00000000 when execute\\n...\\nPC is at 0x0\\nLR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]\\n...\\nmusb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]\\nusb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]\\neth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c\\ndev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4\\nsch_direct_xmit from __dev_queue_xmit+0x334/0xd88\\n__dev_queue_xmit from arp_solicit+0xf0/0x268\\narp_solicit from neigh_probe+0x54/0x7c\\nneigh_probe from __neigh_event_send+0x22c/0x47c\\n__neigh_event_send from neigh_resolve_output+0x14c/0x1c0\\nneigh_resolve_output from ip_finish_output2+0x1c8/0x628\\nip_finish_output2 from ip_send_skb+0x40/0xd8\\nip_send_skb from udp_send_skb+0x124/0x340\\nudp_send_skb from udp_sendmsg+0x780/0x984\\nudp_sendmsg from __sys_sendto+0xd8/0x158\\n__sys_sendto from ret_fast_syscall+0x0/0x58\\n\\nLet\u0027s fix the issue by checking for send_srp() and set_vbus() before\\ncalling them. For USB peripheral only cases these both could be NULL.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: ti: phy-omap-usb2: corrige la desreferencia del puntero NULL para SRP. Si el phy externo que trabaja junto con phy-omap-usb2 no implementa send_srp(), a\u00fan podemos intenta llamarlo. Esto puede suceder en un dispositivo Ethernet inactivo que activa una reactivaci\u00f3n, por ejemplo: configfs-gadget.g1 gadget.0: suspensi\u00f3n de ECM configfs-gadget.g1 gadget.0: puerto suspendido. Activando la activaci\u00f3n... No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se ejecuta... La PC est\u00e1 en 0x0 LR est\u00e1 en musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc] ... musb_gadget_wakeup [musb_hdrc] de usb_gadget_wakeup+0x1c/0x3c [ udc_core] usb_gadget_wakeup [udc_core] de eth_start_xmit+0x3b0/0x3d4 [u_ether] eth_start_xmit [u_ether] de dev_hard_start_xmit+0x94/0x24c dev_hard_start_xmit de sch_direct_xmit+0x104/0x2e4 sch_direct_xmit de __dev_que ue_xmit+0x334/0xd88 __dev_queue_xmit de arp_solicit+0xf0/0x268 arp_solicit de neigh_probe+ 0x54/0x7c neigh_probe de __neigh_event_send+0x22c/0x47c __neigh_event_send de neigh_resolve_output+0x14c/0x1c0 neigh_resolve_output de ip_finish_output2+0x1c8/0x628 ip_finish_output2 de ip_send_skb+0x40/0 xd8 ip_send_skb de udp_send_skb+0x124/0x340 udp_send_skb de udp_sendmsg+0x780/0x984 udp_sendmsg de __sys_sendto+0xd8 /0x158 __sys_sendto de ret_fast_syscall+0x0/0x58 Solucionemos el problema comprobando send_srp() y set_vbus() antes de llamarlos. Para casos exclusivos de perif\u00e9ricos USB, ambos podr\u00edan ser NULL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.7.0\",\"versionEndExcluding\":\"4.19.307\",\"matchCriteriaId\":\"40A92C37-C12B-4C55-B5F8-3E24617E85A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20.0\",\"versionEndExcluding\":\"5.4.269\",\"matchCriteriaId\":\"7D5435B8-EBFE-43EC-9043-6E38BC9C0695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndExcluding\":\"5.10.210\",\"matchCriteriaId\":\"B39742A2-A0C1-490C-95CC-FB78D6D70698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11.0\",\"versionEndExcluding\":\"5.15.149\",\"matchCriteriaId\":\"E6FB1C44-BEEE-4D31-AD44-E15806EA6249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16.0\",\"versionEndExcluding\":\"6.1.78\",\"matchCriteriaId\":\"5ED93437-2DAD-459B-8B46-01C911BDE283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.0\",\"versionEndExcluding\":\"6.6.17\",\"matchCriteriaId\":\"9B4E27C1-FDA4-443A-8088-7D297EB2997B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7.0\",\"versionEndExcluding\":\"6.7.5\",\"matchCriteriaId\":\"06B690E0-5DAC-44EC-947A-D6E4EB0475CA\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.