cve-2022-49909
Vulnerability from cvelistv5
Published
2025-05-01 14:10
Modified
2025-05-04 12:45
Severity ?
EPSS score ?
Summary
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/bluetooth/l2cap_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "db4a0783ed78beb2ebaa32f5f785bfd79c580689", "status": "affected", "version": "d255c861e268ba342e855244639a15f12d7a0bf2", "versionType": "git" }, { "lessThan": "17c6164854f8bb80bf76f32b2c2f199c16b53703", "status": "affected", "version": "5bb395334392891dffae5a0e8f37dbe1d70496c9", "versionType": "git" }, { "lessThan": "7f7bfdd9a9af3b12c33d9da9a012e7f4d5c91f4b", "status": "affected", "version": "bbd1fdb0e1adf827997a93bf108f20ede038e56e", "versionType": "git" }, { "lessThan": "c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab", "status": "affected", "version": "098e07ef0059296e710a801cdbd74b59016e6624", "versionType": "git" }, { "lessThan": "d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd", "status": "affected", "version": "de5d4654ac6c22b1be756fdf7db18471e7df01ea", "versionType": "git" }, { "lessThan": "a3a7b2ac64de232edb67279e804932cb42f0b52a", "status": "affected", "version": "f32d5615a78a1256c4f557ccc6543866e75d03f4", "versionType": "git" }, { "lessThan": "8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9", "status": "affected", "version": "d0be8347c623e0ac4202a1d4e0373882821f56b0", "versionType": "git" }, { "lessThan": "0d0e2d032811280b927650ff3c15fe5020e82533", "status": "affected", "version": "d0be8347c623e0ac4202a1d4e0373882821f56b0", "versionType": "git" }, { "status": "affected", "version": "59a55ec33a54a7179fa178f8aaf8b1cb8e63bd93", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/bluetooth/l2cap_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.19" }, { "lessThan": "5.19", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.9.*", "status": "unaffected", "version": "4.9.333", "versionType": "semver" }, { "lessThanOrEqual": "4.14.*", "status": "unaffected", "version": "4.14.299", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.265", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.224", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.154", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.78", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.1", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.9.333", "versionStartIncluding": "4.9.326", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.14.299", "versionStartIncluding": "4.14.291", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.265", "versionStartIncluding": "4.19.255", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.224", "versionStartIncluding": "5.4.209", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.154", "versionStartIncluding": "5.10.135", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.78", "versionStartIncluding": "5.15.59", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.8", "versionStartIncluding": "5.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1", "versionStartIncluding": "5.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.18.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: fix use-after-free in l2cap_conn_del()\n\nWhen l2cap_recv_frame() is invoked to receive data, and the cid is\nL2CAP_CID_A2MP, if the channel does not exist, it will create a channel.\nHowever, after a channel is created, the hold operation of the channel\nis not performed. In this case, the value of channel reference counting\nis 1. As a result, after hci_error_reset() is triggered, l2cap_conn_del()\ninvokes the close hook function of A2MP to release the channel. Then\n l2cap_chan_unlock(chan) will trigger UAF issue.\n\nThe process is as follows:\nReceive data:\nl2cap_data_channel()\n a2mp_channel_create() ---\u003echannel ref is 2\n l2cap_chan_put() ---\u003echannel ref is 1\n\nTriger event:\n hci_error_reset()\n hci_dev_do_close()\n ...\n l2cap_disconn_cfm()\n l2cap_conn_del()\n l2cap_chan_hold() ---\u003echannel ref is 2\n l2cap_chan_del() ---\u003echannel ref is 1\n a2mp_chan_close_cb() ---\u003echannel ref is 0, release channel\n l2cap_chan_unlock() ---\u003eUAF of channel\n\nThe detailed Call Trace is as follows:\nBUG: KASAN: use-after-free in __mutex_unlock_slowpath+0xa6/0x5e0\nRead of size 8 at addr ffff8880160664b8 by task kworker/u11:1/7593\nWorkqueue: hci0 hci_error_reset\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xcd/0x134\n print_report.cold+0x2ba/0x719\n kasan_report+0xb1/0x1e0\n kasan_check_range+0x140/0x190\n __mutex_unlock_slowpath+0xa6/0x5e0\n l2cap_conn_del+0x404/0x7b0\n l2cap_disconn_cfm+0x8c/0xc0\n hci_conn_hash_flush+0x11f/0x260\n hci_dev_close_sync+0x5f5/0x11f0\n hci_dev_do_close+0x2d/0x70\n hci_error_reset+0x9e/0x140\n process_one_work+0x98a/0x1620\n worker_thread+0x665/0x1080\n kthread+0x2e4/0x3a0\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 7593:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0xa9/0xd0\n l2cap_chan_create+0x40/0x930\n amp_mgr_create+0x96/0x990\n a2mp_channel_create+0x7d/0x150\n l2cap_recv_frame+0x51b8/0x9a70\n l2cap_recv_acldata+0xaa3/0xc00\n hci_rx_work+0x702/0x1220\n process_one_work+0x98a/0x1620\n worker_thread+0x665/0x1080\n kthread+0x2e4/0x3a0\n ret_from_fork+0x1f/0x30\n\nFreed by task 7593:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_set_free_info+0x20/0x30\n ____kasan_slab_free+0x167/0x1c0\n slab_free_freelist_hook+0x89/0x1c0\n kfree+0xe2/0x580\n l2cap_chan_put+0x22a/0x2d0\n l2cap_conn_del+0x3fc/0x7b0\n l2cap_disconn_cfm+0x8c/0xc0\n hci_conn_hash_flush+0x11f/0x260\n hci_dev_close_sync+0x5f5/0x11f0\n hci_dev_do_close+0x2d/0x70\n hci_error_reset+0x9e/0x140\n process_one_work+0x98a/0x1620\n worker_thread+0x665/0x1080\n kthread+0x2e4/0x3a0\n ret_from_fork+0x1f/0x30\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0xbe/0xd0\n call_rcu+0x99/0x740\n netlink_release+0xe6a/0x1cf0\n __sock_release+0xcd/0x280\n sock_close+0x18/0x20\n __fput+0x27c/0xa90\n task_work_run+0xdd/0x1a0\n exit_to_user_mode_prepare+0x23c/0x250\n syscall_exit_to_user_mode+0x19/0x50\n do_syscall_64+0x42/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0xbe/0xd0\n call_rcu+0x99/0x740\n netlink_release+0xe6a/0x1cf0\n __sock_release+0xcd/0x280\n sock_close+0x18/0x20\n __fput+0x27c/0xa90\n task_work_run+0xdd/0x1a0\n exit_to_user_mode_prepare+0x23c/0x250\n syscall_exit_to_user_mode+0x19/0x50\n do_syscall_64+0x42/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd" } ], "providerMetadata": { "dateUpdated": "2025-05-04T12:45:25.157Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/db4a0783ed78beb2ebaa32f5f785bfd79c580689" }, { "url": "https://git.kernel.org/stable/c/17c6164854f8bb80bf76f32b2c2f199c16b53703" }, { "url": "https://git.kernel.org/stable/c/7f7bfdd9a9af3b12c33d9da9a012e7f4d5c91f4b" }, { "url": "https://git.kernel.org/stable/c/c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab" }, { "url": "https://git.kernel.org/stable/c/d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd" }, { "url": "https://git.kernel.org/stable/c/a3a7b2ac64de232edb67279e804932cb42f0b52a" }, { "url": "https://git.kernel.org/stable/c/8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9" }, { "url": "https://git.kernel.org/stable/c/0d0e2d032811280b927650ff3c15fe5020e82533" } ], "title": "Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-49909", "datePublished": "2025-05-01T14:10:52.331Z", "dateReserved": "2025-05-01T14:05:17.247Z", "dateUpdated": "2025-05-04T12:45:25.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-49909\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-01T15:16:16.030\",\"lastModified\":\"2025-05-02T13:52:51.693\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: L2CAP: fix use-after-free in l2cap_conn_del()\\n\\nWhen l2cap_recv_frame() is invoked to receive data, and the cid is\\nL2CAP_CID_A2MP, if the channel does not exist, it will create a channel.\\nHowever, after a channel is created, the hold operation of the channel\\nis not performed. In this case, the value of channel reference counting\\nis 1. As a result, after hci_error_reset() is triggered, l2cap_conn_del()\\ninvokes the close hook function of A2MP to release the channel. Then\\n l2cap_chan_unlock(chan) will trigger UAF issue.\\n\\nThe process is as follows:\\nReceive data:\\nl2cap_data_channel()\\n a2mp_channel_create() ---\u003echannel ref is 2\\n l2cap_chan_put() ---\u003echannel ref is 1\\n\\nTriger event:\\n hci_error_reset()\\n hci_dev_do_close()\\n ...\\n l2cap_disconn_cfm()\\n l2cap_conn_del()\\n l2cap_chan_hold() ---\u003echannel ref is 2\\n l2cap_chan_del() ---\u003echannel ref is 1\\n a2mp_chan_close_cb() ---\u003echannel ref is 0, release channel\\n l2cap_chan_unlock() ---\u003eUAF of channel\\n\\nThe detailed Call Trace is as follows:\\nBUG: KASAN: use-after-free in __mutex_unlock_slowpath+0xa6/0x5e0\\nRead of size 8 at addr ffff8880160664b8 by task kworker/u11:1/7593\\nWorkqueue: hci0 hci_error_reset\\nCall Trace:\\n \u003cTASK\u003e\\n dump_stack_lvl+0xcd/0x134\\n print_report.cold+0x2ba/0x719\\n kasan_report+0xb1/0x1e0\\n kasan_check_range+0x140/0x190\\n __mutex_unlock_slowpath+0xa6/0x5e0\\n l2cap_conn_del+0x404/0x7b0\\n l2cap_disconn_cfm+0x8c/0xc0\\n hci_conn_hash_flush+0x11f/0x260\\n hci_dev_close_sync+0x5f5/0x11f0\\n hci_dev_do_close+0x2d/0x70\\n hci_error_reset+0x9e/0x140\\n process_one_work+0x98a/0x1620\\n worker_thread+0x665/0x1080\\n kthread+0x2e4/0x3a0\\n ret_from_fork+0x1f/0x30\\n \u003c/TASK\u003e\\n\\nAllocated by task 7593:\\n kasan_save_stack+0x1e/0x40\\n __kasan_kmalloc+0xa9/0xd0\\n l2cap_chan_create+0x40/0x930\\n amp_mgr_create+0x96/0x990\\n a2mp_channel_create+0x7d/0x150\\n l2cap_recv_frame+0x51b8/0x9a70\\n l2cap_recv_acldata+0xaa3/0xc00\\n hci_rx_work+0x702/0x1220\\n process_one_work+0x98a/0x1620\\n worker_thread+0x665/0x1080\\n kthread+0x2e4/0x3a0\\n ret_from_fork+0x1f/0x30\\n\\nFreed by task 7593:\\n kasan_save_stack+0x1e/0x40\\n kasan_set_track+0x21/0x30\\n kasan_set_free_info+0x20/0x30\\n ____kasan_slab_free+0x167/0x1c0\\n slab_free_freelist_hook+0x89/0x1c0\\n kfree+0xe2/0x580\\n l2cap_chan_put+0x22a/0x2d0\\n l2cap_conn_del+0x3fc/0x7b0\\n l2cap_disconn_cfm+0x8c/0xc0\\n hci_conn_hash_flush+0x11f/0x260\\n hci_dev_close_sync+0x5f5/0x11f0\\n hci_dev_do_close+0x2d/0x70\\n hci_error_reset+0x9e/0x140\\n process_one_work+0x98a/0x1620\\n worker_thread+0x665/0x1080\\n kthread+0x2e4/0x3a0\\n ret_from_fork+0x1f/0x30\\n\\nLast potentially related work creation:\\n kasan_save_stack+0x1e/0x40\\n __kasan_record_aux_stack+0xbe/0xd0\\n call_rcu+0x99/0x740\\n netlink_release+0xe6a/0x1cf0\\n __sock_release+0xcd/0x280\\n sock_close+0x18/0x20\\n __fput+0x27c/0xa90\\n task_work_run+0xdd/0x1a0\\n exit_to_user_mode_prepare+0x23c/0x250\\n syscall_exit_to_user_mode+0x19/0x50\\n do_syscall_64+0x42/0x80\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nSecond to last potentially related work creation:\\n kasan_save_stack+0x1e/0x40\\n __kasan_record_aux_stack+0xbe/0xd0\\n call_rcu+0x99/0x740\\n netlink_release+0xe6a/0x1cf0\\n __sock_release+0xcd/0x280\\n sock_close+0x18/0x20\\n __fput+0x27c/0xa90\\n task_work_run+0xdd/0x1a0\\n exit_to_user_mode_prepare+0x23c/0x250\\n syscall_exit_to_user_mode+0x19/0x50\\n do_syscall_64+0x42/0x80\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: correcci\u00f3n de use-after-free en l2cap_conn_del(). Cuando se invoca l2cap_recv_frame() para recibir datos y el CID es L2CAP_CID_A2MP, si el canal no existe, se crea uno. Sin embargo, una vez creado el canal, no se realiza la operaci\u00f3n de retenci\u00f3n. En este caso, el valor del recuento de referencias del canal es 1. Como resultado, tras la activaci\u00f3n de hci_error_reset(), l2cap_conn_del() invoca la funci\u00f3n de cierre de A2MP para liberar el canal. Entonces, l2cap_chan_unlock(chan) activar\u00e1 el problema de UAF. El proceso es el siguiente: Recibir datos: l2cap_data_channel() a2mp_channel_create() ---\u0026gt;la referencia del canal es 2 l2cap_chan_put() ---\u0026gt;la referencia del canal es 1 Evento desencadenador: hci_error_reset() hci_dev_do_close() ... l2cap_disconn_cfm() l2cap_conn_del() l2cap_chan_hold() ---\u0026gt;la referencia del canal es 2 l2cap_chan_del() ---\u0026gt;la referencia del canal es 1 a2mp_chan_close_cb() ---\u0026gt;la referencia del canal es 0, liberar el canal l2cap_chan_unlock() ---\u0026gt;UAF del canal El seguimiento de llamadas detallado es el siguiente: ERROR: KASAN: use-after-free en __mutex_unlock_slowpath+0xa6/0x5e0 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff8880160664b8 por la tarea kworker/u11:1/7593 Cola de trabajo: hci0 Rastreo de llamadas hci_error_reset: dump_stack_lvl+0xcd/0x134 print_report.cold+0x2ba/0x719 kasan_report+0xb1/0x1e0 kasan_check_range+0x140/0x190 __mutex_unlock_slowpath+0xa6/0x5e0 l2cap_conn_del+0x404/0x7b0 l2cap_disconn_cfm+0x8c/0xc0 hci_conn_hash_flush+0x11f/0x260 hci_dev_close_sync+0x5f5/0x11f0 hci_dev_do_close+0x2d/0x70 hci_error_reset+0x9e/0x140 process_one_work+0x98a/0x1620 worker_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30 Allocated by task 7593: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0xa9/0xd0 l2cap_chan_create+0x40/0x930 amp_mgr_create+0x96/0x990 a2mp_channel_create+0x7d/0x150 l2cap_recv_frame+0x51b8/0x9a70 l2cap_recv_acldata+0xaa3/0xc00 hci_rx_work+0x702/0x1220 process_one_work+0x98a/0x1620 worker_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30 Freed by task 7593: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_set_free_info+0x20/0x30 ____kasan_slab_free+0x167/0x1c0 slab_free_freelist_hook+0x89/0x1c0 kfree+0xe2/0x580 l2cap_chan_put+0x22a/0x2d0 l2cap_conn_del+0x3fc/0x7b0 l2cap_disconn_cfm+0x8c/0xc0 hci_conn_hash_flush+0x11f/0x260 hci_dev_close_sync+0x5f5/0x11f0 hci_dev_do_close+0x2d/0x70 hci_error_reset+0x9e/0x140 process_one_work+0x98a/0x1620 worker_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30 Last potentially related work creation: kasan_save_stack+0x1e/0x40 __kasan_record_aux_stack+0xbe/0xd0 call_rcu+0x99/0x740 netlink_release+0xe6a/0x1cf0 __sock_release+0xcd/0x280 sock_close+0x18/0x20 __fput+0x27c/0xa90 task_work_run+0xdd/0x1a0 exit_to_user_mode_prepare+0x23c/0x250 syscall_exit_to_user_mode+0x19/0x50 do_syscall_64+0x42/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Second to last potentially related work creation: kasan_save_stack+0x1e/0x40 __kasan_record_aux_stack+0xbe/0xd0 call_rcu+0x99/0x740 netlink_release+0xe6a/0x1cf0 __sock_release+0xcd/0x280 sock_close+0x18/0x20 __fput+0x27c/0xa90 task_work_run+0xdd/0x1a0 exit_to_user_mode_prepare+0x23c/0x250 syscall_exit_to_user_mode+0x19/0x50 do_syscall_64+0x42/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd \"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d0e2d032811280b927650ff3c15fe5020e82533\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/17c6164854f8bb80bf76f32b2c2f199c16b53703\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7f7bfdd9a9af3b12c33d9da9a012e7f4d5c91f4b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3a7b2ac64de232edb67279e804932cb42f0b52a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/db4a0783ed78beb2ebaa32f5f785bfd79c580689\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.