CVE-2024-46828 (GCVE-0-2024-46828)

Vulnerability from cvelistv5 – Published: 2024-09-27 12:39 – Updated: 2025-11-03 22:19
VLAI?
Title
sched: sch_cake: fix bulk flow accounting logic for host fairness
Summary
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-robin weight when iterating through flows. The count of active bulk flows is updated whenever a flow changes state. This has a peculiar interaction with the hash collision handling: when a hash collision occurs (after the set-associative hashing), the state of the hash bucket is simply updated to match the new packet that collided, and if host fairness is enabled, that also means assigning new per-host state to the flow. For this reason, the bulk flow counters of the host(s) assigned to the flow are decremented, before new state is assigned (and the counters, which may not belong to the same host anymore, are incremented again). Back when this code was introduced, the host fairness mode was always enabled, so the decrement was unconditional. When the configuration flags were introduced the *increment* was made conditional, but the *decrement* was not. Which of course can lead to a spurious decrement (and associated wrap-around to U16_MAX). AFAICT, when host fairness is disabled, the decrement and wrap-around happens as soon as a hash collision occurs (which is not that common in itself, due to the set-associative hashing). However, in most cases this is harmless, as the value is only used when host fairness mode is enabled. So in order to trigger an array overflow, sch_cake has to first be configured with host fairness disabled, and while running in this mode, a hash collision has to occur to cause the overflow. Then, the qdisc has to be reconfigured to enable host fairness, which leads to the array out-of-bounds because the wrapped-around value is retained and used as an array index. It seems that syzbot managed to trigger this, which is quite impressive in its own right. This patch fixes the issue by introducing the same conditional check on decrement as is used on increment. The original bug predates the upstreaming of cake, but the commit listed in the Fixes tag touched that code, meaning that this patch won't apply before that.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < 4a4eeefa514db570be025ab46d779af180e2c9bb (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < 7725152b54d295b7da5e34c2f419539b30d017bd (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < cde71a5677971f4f1b69b25e854891dbe78066a4 (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < 549e407569e08459d16122341d332cb508024094 (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < d4a9039a7b3d8005b90c7b1a55a306444f0e5447 (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < d7c01c0714c04431b5e18cf17a9ea68a553d1c3c (git)
Affected: 712639929912c5eefb09facccb48d55b3f72c9f8 , < 546ea84d07e3e324644025e2aae2d12ea4c5896e (git)
Create a notification for this product.
    Linux Linux Affected: 5.1
Unaffected: 0 , < 5.1 (semver)
Unaffected: 5.4.284 , ≤ 5.4.* (semver)
Unaffected: 5.10.226 , ≤ 5.10.* (semver)
Unaffected: 5.15.167 , ≤ 5.15.* (semver)
Unaffected: 6.1.110 , ≤ 6.1.* (semver)
Unaffected: 6.6.51 , ≤ 6.6.* (semver)
Unaffected: 6.10.10 , ≤ 6.10.* (semver)
Unaffected: 6.11 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-46828",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-29T14:12:31.391068Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-29T14:12:40.796Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:19:16.846Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/sched/sch_cake.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4a4eeefa514db570be025ab46d779af180e2c9bb",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "7725152b54d295b7da5e34c2f419539b30d017bd",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "cde71a5677971f4f1b69b25e854891dbe78066a4",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "549e407569e08459d16122341d332cb508024094",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "d4a9039a7b3d8005b90c7b1a55a306444f0e5447",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "d7c01c0714c04431b5e18cf17a9ea68a553d1c3c",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            },
            {
              "lessThan": "546ea84d07e3e324644025e2aae2d12ea4c5896e",
              "status": "affected",
              "version": "712639929912c5eefb09facccb48d55b3f72c9f8",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/sched/sch_cake.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.1"
            },
            {
              "lessThan": "5.1",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.284",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.226",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.167",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.110",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.51",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.284",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.226",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.167",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.110",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.51",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.10",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: sch_cake: fix bulk flow accounting logic for host fairness\n\nIn sch_cake, we keep track of the count of active bulk flows per host,\nwhen running in dst/src host fairness mode, which is used as the\nround-robin weight when iterating through flows. The count of active\nbulk flows is updated whenever a flow changes state.\n\nThis has a peculiar interaction with the hash collision handling: when a\nhash collision occurs (after the set-associative hashing), the state of\nthe hash bucket is simply updated to match the new packet that collided,\nand if host fairness is enabled, that also means assigning new per-host\nstate to the flow. For this reason, the bulk flow counters of the\nhost(s) assigned to the flow are decremented, before new state is\nassigned (and the counters, which may not belong to the same host\nanymore, are incremented again).\n\nBack when this code was introduced, the host fairness mode was always\nenabled, so the decrement was unconditional. When the configuration\nflags were introduced the *increment* was made conditional, but\nthe *decrement* was not. Which of course can lead to a spurious\ndecrement (and associated wrap-around to U16_MAX).\n\nAFAICT, when host fairness is disabled, the decrement and wrap-around\nhappens as soon as a hash collision occurs (which is not that common in\nitself, due to the set-associative hashing). However, in most cases this\nis harmless, as the value is only used when host fairness mode is\nenabled. So in order to trigger an array overflow, sch_cake has to first\nbe configured with host fairness disabled, and while running in this\nmode, a hash collision has to occur to cause the overflow. Then, the\nqdisc has to be reconfigured to enable host fairness, which leads to the\narray out-of-bounds because the wrapped-around value is retained and\nused as an array index. It seems that syzbot managed to trigger this,\nwhich is quite impressive in its own right.\n\nThis patch fixes the issue by introducing the same conditional check on\ndecrement as is used on increment.\n\nThe original bug predates the upstreaming of cake, but the commit listed\nin the Fixes tag touched that code, meaning that this patch won\u0027t apply\nbefore that."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:35:24.446Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4a4eeefa514db570be025ab46d779af180e2c9bb"
        },
        {
          "url": "https://git.kernel.org/stable/c/7725152b54d295b7da5e34c2f419539b30d017bd"
        },
        {
          "url": "https://git.kernel.org/stable/c/cde71a5677971f4f1b69b25e854891dbe78066a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/549e407569e08459d16122341d332cb508024094"
        },
        {
          "url": "https://git.kernel.org/stable/c/d4a9039a7b3d8005b90c7b1a55a306444f0e5447"
        },
        {
          "url": "https://git.kernel.org/stable/c/d7c01c0714c04431b5e18cf17a9ea68a553d1c3c"
        },
        {
          "url": "https://git.kernel.org/stable/c/546ea84d07e3e324644025e2aae2d12ea4c5896e"
        }
      ],
      "title": "sched: sch_cake: fix bulk flow accounting logic for host fairness",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-46828",
    "datePublished": "2024-09-27T12:39:27.100Z",
    "dateReserved": "2024-09-11T15:12:18.286Z",
    "dateUpdated": "2025-11-03T22:19:16.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46828\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T14:12:31.391068Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T14:12:32.691Z\"}}], \"cna\": {\"title\": \"sched: sch_cake: fix bulk flow accounting logic for host fairness\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"4a4eeefa514db570be025ab46d779af180e2c9bb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"7725152b54d295b7da5e34c2f419539b30d017bd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"cde71a5677971f4f1b69b25e854891dbe78066a4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"549e407569e08459d16122341d332cb508024094\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"d4a9039a7b3d8005b90c7b1a55a306444f0e5447\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"d7c01c0714c04431b5e18cf17a9ea68a553d1c3c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"712639929912c5eefb09facccb48d55b3f72c9f8\", \"lessThan\": \"546ea84d07e3e324644025e2aae2d12ea4c5896e\", \"versionType\": \"git\"}], \"programFiles\": [\"net/sched/sch_cake.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.284\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.226\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.167\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.110\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.51\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/sched/sch_cake.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4a4eeefa514db570be025ab46d779af180e2c9bb\"}, {\"url\": \"https://git.kernel.org/stable/c/7725152b54d295b7da5e34c2f419539b30d017bd\"}, {\"url\": \"https://git.kernel.org/stable/c/cde71a5677971f4f1b69b25e854891dbe78066a4\"}, {\"url\": \"https://git.kernel.org/stable/c/549e407569e08459d16122341d332cb508024094\"}, {\"url\": \"https://git.kernel.org/stable/c/d4a9039a7b3d8005b90c7b1a55a306444f0e5447\"}, {\"url\": \"https://git.kernel.org/stable/c/d7c01c0714c04431b5e18cf17a9ea68a553d1c3c\"}, {\"url\": \"https://git.kernel.org/stable/c/546ea84d07e3e324644025e2aae2d12ea4c5896e\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsched: sch_cake: fix bulk flow accounting logic for host fairness\\n\\nIn sch_cake, we keep track of the count of active bulk flows per host,\\nwhen running in dst/src host fairness mode, which is used as the\\nround-robin weight when iterating through flows. The count of active\\nbulk flows is updated whenever a flow changes state.\\n\\nThis has a peculiar interaction with the hash collision handling: when a\\nhash collision occurs (after the set-associative hashing), the state of\\nthe hash bucket is simply updated to match the new packet that collided,\\nand if host fairness is enabled, that also means assigning new per-host\\nstate to the flow. For this reason, the bulk flow counters of the\\nhost(s) assigned to the flow are decremented, before new state is\\nassigned (and the counters, which may not belong to the same host\\nanymore, are incremented again).\\n\\nBack when this code was introduced, the host fairness mode was always\\nenabled, so the decrement was unconditional. When the configuration\\nflags were introduced the *increment* was made conditional, but\\nthe *decrement* was not. Which of course can lead to a spurious\\ndecrement (and associated wrap-around to U16_MAX).\\n\\nAFAICT, when host fairness is disabled, the decrement and wrap-around\\nhappens as soon as a hash collision occurs (which is not that common in\\nitself, due to the set-associative hashing). However, in most cases this\\nis harmless, as the value is only used when host fairness mode is\\nenabled. So in order to trigger an array overflow, sch_cake has to first\\nbe configured with host fairness disabled, and while running in this\\nmode, a hash collision has to occur to cause the overflow. Then, the\\nqdisc has to be reconfigured to enable host fairness, which leads to the\\narray out-of-bounds because the wrapped-around value is retained and\\nused as an array index. It seems that syzbot managed to trigger this,\\nwhich is quite impressive in its own right.\\n\\nThis patch fixes the issue by introducing the same conditional check on\\ndecrement as is used on increment.\\n\\nThe original bug predates the upstreaming of cake, but the commit listed\\nin the Fixes tag touched that code, meaning that this patch won\u0027t apply\\nbefore that.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.284\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.226\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.167\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.110\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.51\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.10\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"5.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:35:24.446Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-46828\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:35:24.446Z\", \"dateReserved\": \"2024-09-11T15:12:18.286Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-27T12:39:27.100Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…