CVE-2023-52567 (GCVE-0-2023-52567)
Vulnerability from cvelistv5
Published
2024-03-02 21:59
Modified
2025-05-04 12:49
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250_port: Check IRQ data before use
In case the leaf driver wants to use IRQ polling (irq = 0) and
IIR register shows that an interrupt happened in the 8250 hardware
the IRQ data can be NULL. In such a case we need to skip the wake
event as we came to this path from the timer interrupt and quite
likely system is already awake.
Without this fix we have got an Oops:
serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A
...
BUG: kernel NULL pointer dereference, address: 0000000000000010
RIP: 0010:serial8250_handle_irq+0x7c/0x240
Call Trace:
? serial8250_handle_irq+0x7c/0x240
? __pfx_serial8250_timeout+0x10/0x10
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Version: edfe57aedff4ecf3606533aabf8ecf7676c3c5d9 Version: 0bd49a043c7984c93c2a0af41222fb71c3986a4e Version: 572d48361aa0a6e6f16c1470e5407de183493d0c Version: d5d628fea5f6181809a9d61b04de6ade53277684 Version: 424cf29296354d7b9c6c038aaa7bb71782100851 Version: 727e92fe13e81c6088a88d83e466b2b1b553c4e3 Version: 0ba9e3a13c6adfa99e32b2576d20820ab10ad48a Version: 0ba9e3a13c6adfa99e32b2576d20820ab10ad48a Version: d7c6aa39eb041e2a6a53106104200d11e2acc87f Version: f5fd2fd999b364801e9790c6f69f3fe3f40ed60f |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-52567",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-21T16:12:47.412833Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-21T16:12:54.742Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:03:20.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/tty/serial/8250/8250_port.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "ee5732caaffba3a37e753fdb89b4958db9a61847",
"status": "affected",
"version": "edfe57aedff4ecf3606533aabf8ecf7676c3c5d9",
"versionType": "git"
},
{
"lessThan": "c334650150c29234b0923476f51573ae1b2f252a",
"status": "affected",
"version": "0bd49a043c7984c93c2a0af41222fb71c3986a4e",
"versionType": "git"
},
{
"lessThan": "bf3c728e3692cc6d998874f0f27d433117348742",
"status": "affected",
"version": "572d48361aa0a6e6f16c1470e5407de183493d0c",
"versionType": "git"
},
{
"lessThan": "e14afa4450cb7e4cf93e993a765801203d41d014",
"status": "affected",
"version": "d5d628fea5f6181809a9d61b04de6ade53277684",
"versionType": "git"
},
{
"lessThan": "2b837f13a818f96304736453ac53b66a70aaa4f2",
"status": "affected",
"version": "424cf29296354d7b9c6c038aaa7bb71782100851",
"versionType": "git"
},
{
"lessThan": "e14f68a48fd445a083ac0750fafcb064df5f18f7",
"status": "affected",
"version": "727e92fe13e81c6088a88d83e466b2b1b553c4e3",
"versionType": "git"
},
{
"lessThan": "3345cc5f02f1fb4c4dcb114706f2210d879ab933",
"status": "affected",
"version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
"versionType": "git"
},
{
"lessThan": "cce7fc8b29961b64fadb1ce398dc5ff32a79643b",
"status": "affected",
"version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
"versionType": "git"
},
{
"status": "affected",
"version": "d7c6aa39eb041e2a6a53106104200d11e2acc87f",
"versionType": "git"
},
{
"status": "affected",
"version": "f5fd2fd999b364801e9790c6f69f3fe3f40ed60f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/tty/serial/8250/8250_port.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.4"
},
{
"lessThan": "6.4",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.327",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.296",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.258",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.198",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.134",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.56",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.327",
"versionStartIncluding": "4.14.315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.296",
"versionStartIncluding": "4.19.283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.258",
"versionStartIncluding": "5.4.243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.198",
"versionStartIncluding": "5.10.180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.134",
"versionStartIncluding": "5.15.111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.56",
"versionStartIncluding": "6.1.28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.6",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n ...\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n RIP: 0010:serial8250_handle_irq+0x7c/0x240\n Call Trace:\n ? serial8250_handle_irq+0x7c/0x240\n ? __pfx_serial8250_timeout+0x10/0x10"
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T12:49:17.520Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"
},
{
"url": "https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"
},
{
"url": "https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"
},
{
"url": "https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"
},
{
"url": "https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"
},
{
"url": "https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"
},
{
"url": "https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"
},
{
"url": "https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"
}
],
"title": "serial: 8250_port: Check IRQ data before use",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-52567",
"datePublished": "2024-03-02T21:59:38.815Z",
"dateReserved": "2024-03-02T21:55:42.567Z",
"dateUpdated": "2025-05-04T12:49:17.520Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:03:20.694Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52567\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-21T16:12:47.412833Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-21T16:12:51.987Z\"}}], \"cna\": {\"title\": \"serial: 8250_port: Check IRQ data before use\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"edfe57aedff4ecf3606533aabf8ecf7676c3c5d9\", \"lessThan\": \"ee5732caaffba3a37e753fdb89b4958db9a61847\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bd49a043c7984c93c2a0af41222fb71c3986a4e\", \"lessThan\": \"c334650150c29234b0923476f51573ae1b2f252a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"572d48361aa0a6e6f16c1470e5407de183493d0c\", \"lessThan\": \"bf3c728e3692cc6d998874f0f27d433117348742\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d5d628fea5f6181809a9d61b04de6ade53277684\", \"lessThan\": \"e14afa4450cb7e4cf93e993a765801203d41d014\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"424cf29296354d7b9c6c038aaa7bb71782100851\", \"lessThan\": \"2b837f13a818f96304736453ac53b66a70aaa4f2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"727e92fe13e81c6088a88d83e466b2b1b553c4e3\", \"lessThan\": \"e14f68a48fd445a083ac0750fafcb064df5f18f7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a\", \"lessThan\": \"3345cc5f02f1fb4c4dcb114706f2210d879ab933\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a\", \"lessThan\": \"cce7fc8b29961b64fadb1ce398dc5ff32a79643b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d7c6aa39eb041e2a6a53106104200d11e2acc87f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5fd2fd999b364801e9790c6f69f3fe3f40ed60f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/tty/serial/8250/8250_port.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.327\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.296\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.258\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.198\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.134\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.56\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.5.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/tty/serial/8250/8250_port.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847\"}, {\"url\": \"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a\"}, {\"url\": \"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742\"}, {\"url\": \"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014\"}, {\"url\": \"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2\"}, {\"url\": \"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7\"}, {\"url\": \"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933\"}, {\"url\": \"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nserial: 8250_port: Check IRQ data before use\\n\\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\\nIIR register shows that an interrupt happened in the 8250 hardware\\nthe IRQ data can be NULL. In such a case we need to skip the wake\\nevent as we came to this path from the timer interrupt and quite\\nlikely system is already awake.\\n\\nWithout this fix we have got an Oops:\\n\\n serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\\n ...\\n BUG: kernel NULL pointer dereference, address: 0000000000000010\\n RIP: 0010:serial8250_handle_irq+0x7c/0x240\\n Call Trace:\\n ? serial8250_handle_irq+0x7c/0x240\\n ? __pfx_serial8250_timeout+0x10/0x10\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.327\", \"versionStartIncluding\": \"4.14.315\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.296\", \"versionStartIncluding\": \"4.19.283\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.258\", \"versionStartIncluding\": \"5.4.243\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.198\", \"versionStartIncluding\": \"5.10.180\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.134\", \"versionStartIncluding\": \"5.15.111\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.56\", \"versionStartIncluding\": \"6.1.28\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.5.6\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.2.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.3.2\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:49:17.520Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-52567\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:49:17.520Z\", \"dateReserved\": \"2024-03-02T21:55:42.567Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-02T21:59:38.815Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…