cve-2024-47684
Vulnerability from cvelistv5
Published
2024-10-21 11:53
Modified
2024-12-19 09:25
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023 Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 <48> 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3 Jul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246 Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000 Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60 Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8 Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900 Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30 Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000 Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0 Jul 26 15:05:02 rx [11061395.913822] PKRU: 55555554 Jul 26 15:05:02 rx [11061395.916786] Call Trace: Jul 26 15:05:02 rx [11061395.919488] Jul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f Jul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9 Jul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380 Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0 Jul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50 Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0 Jul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20 Jul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450 Jul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140 Jul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90 Jul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0 Jul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40 Jul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220 Jul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240 Jul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0 Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240 Jul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130 Jul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280 Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10 Jul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30 Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Version: e1a10ef7fa876f8510aaec36ea5c0cf34baba410
Create a notification for this product.
   Linux Linux Version: 4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47684",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T13:06:54.270421Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T13:14:16.209Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "include/net/tcp.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ad4f0a14d6856e68f023fc4e5017cfd881a3dfbc",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "16e0387d87fc858e34449fdf2b14ed5837f761db",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "5c4c03288a4aea705e36aa44119c13d7ee4dce99",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "96c4983eab2a5da235f7fff90beaf17b008ba029",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "570f7d8c9bf14f041152ba8353d4330ef7575915",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "81d18c152e3f82bacadf83bc0a471b2363b9cc18",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "09aea49fbc7e755a915c405644f347137cdb62b0",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            },
            {
              "lessThan": "c8770db2d54437a5f49417ae7b46f7de23d14db6",
              "status": "affected",
              "version": "e1a10ef7fa876f8510aaec36ea5c0cf34baba410",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "include/net/tcp.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.13"
            },
            {
              "lessThan": "4.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: check skb is non-NULL in tcp_rto_delta_us()\n\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\nkernel that are running ceph and recently hit a null ptr dereference in\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\nsaw it getting hit from the RACK case as well. Here are examples of the oops\nmessages we saw in each of those cases:\n\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\nJul 26 15:05:02 rx [11061395.919488]\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:25:57.237Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ad4f0a14d6856e68f023fc4e5017cfd881a3dfbc"
        },
        {
          "url": "https://git.kernel.org/stable/c/16e0387d87fc858e34449fdf2b14ed5837f761db"
        },
        {
          "url": "https://git.kernel.org/stable/c/ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c4c03288a4aea705e36aa44119c13d7ee4dce99"
        },
        {
          "url": "https://git.kernel.org/stable/c/96c4983eab2a5da235f7fff90beaf17b008ba029"
        },
        {
          "url": "https://git.kernel.org/stable/c/570f7d8c9bf14f041152ba8353d4330ef7575915"
        },
        {
          "url": "https://git.kernel.org/stable/c/81d18c152e3f82bacadf83bc0a471b2363b9cc18"
        },
        {
          "url": "https://git.kernel.org/stable/c/09aea49fbc7e755a915c405644f347137cdb62b0"
        },
        {
          "url": "https://git.kernel.org/stable/c/c8770db2d54437a5f49417ae7b46f7de23d14db6"
        }
      ],
      "title": "tcp: check skb is non-NULL in tcp_rto_delta_us()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-47684",
    "datePublished": "2024-10-21T11:53:25.787Z",
    "dateReserved": "2024-09-30T16:00:12.941Z",
    "dateUpdated": "2024-12-19T09:25:57.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-47684\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T12:15:05.290\",\"lastModified\":\"2024-11-08T16:15:24.967\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntcp: check skb is non-NULL in tcp_rto_delta_us()\\n\\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\\nkernel that are running ceph and recently hit a null ptr dereference in\\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\\nsaw it getting hit from the RACK case as well. Here are examples of the oops\\nmessages we saw in each of those cases:\\n\\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\\nJul 26 15:05:02 rx [11061395.919488]\\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: check skb is non-NULL in tcp_rto_delta_us() Tenemos algunas m\u00e1quinas que ejecutan Ubuntu 20.04.6 de f\u00e1brica, que es su kernel 5.4.0-174-generic, que ejecutan ceph y recientemente encontraron una desreferencia ptr nula en tcp_rearm_rto(). Inicialmente, lo encontramos desde la ruta TLP, pero luego tambi\u00e9n lo encontramos desde el caso RACK. Estos son ejemplos de los mensajes de error que vimos en cada uno de esos casos: Jul 26 15:05:02 rx [11061395.780353] ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000020 Jul 26 15:05:02 rx [11061395.787572] #PF: acceso de lectura de supervisor en modo kernel Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - p\u00e1gina no presente Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0 Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI 26 de julio 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Contaminado: GW 5.4.0-174-generic #193-Ubuntu 26 de julio 15:05:02 rx [11061395.814996] Nombre del hardware: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 09/05/2023 26 de julio 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160 26 de julio 15:05:02 rx [11061395.830656] C\u00f3digo: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u0026lt;48\u0026gt; 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3 26 jul 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246 26 jul 15:05:02 rx [11061395.855149] RAX: 000000000000000 RBX: 20c49ba5e353f7cf RCX: 000000000000000 26 jul 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60 26 de julio 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8 26 de julio 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900 26 de julio 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30 26 de julio 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000 26 de julio 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 26 de julio 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0 26 de julio 15:05:02 rx [11061395.913822] PKRU: 55555554 26 de julio 15:05:02 rx [11061395.916786] Rastreo de llamadas: 26 de julio 15:05:02 rx [11061395.919488] 26 de julio 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f 26 de julio 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9 26 de julio 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380 26 de julio 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0 26 de julio 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50 26 de julio 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0 26 de julio 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20 26 de julio 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450 26 de julio 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140 26 de julio 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90 26 de julio 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0 26 de julio 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40 26 de julio 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160 26 de julio 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160 26 de julio 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220 26 de julio 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240 26 de julio 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0 26 de julio 15:05:02 rx [11061395.994814] ? recalibrate_cpu_khz+0x10/0x10 26 de julio 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30 26 de julio 15:05:02 rx [11061396.017718] ? lapic_next_even ---truncado---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.13\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"95F0968E-E3F7-42E8-A144-E4B74A2B6541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:3.10.108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02030EBE-08C6-4D18-8E53-8F3C6DCD410E\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/09aea49fbc7e755a915c405644f347137cdb62b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/16e0387d87fc858e34449fdf2b14ed5837f761db\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/570f7d8c9bf14f041152ba8353d4330ef7575915\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c4c03288a4aea705e36aa44119c13d7ee4dce99\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/81d18c152e3f82bacadf83bc0a471b2363b9cc18\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/96c4983eab2a5da235f7fff90beaf17b008ba029\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad4f0a14d6856e68f023fc4e5017cfd881a3dfbc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c8770db2d54437a5f49417ae7b46f7de23d14db6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47684\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:06:54.270421Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:06:57.480Z\"}}], \"cna\": {\"title\": \"tcp: check skb is non-NULL in tcp_rto_delta_us()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"ad4f0a14d6856e68f023fc4e5017cfd881a3dfbc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"16e0387d87fc858e34449fdf2b14ed5837f761db\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"5c4c03288a4aea705e36aa44119c13d7ee4dce99\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"96c4983eab2a5da235f7fff90beaf17b008ba029\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"570f7d8c9bf14f041152ba8353d4330ef7575915\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"81d18c152e3f82bacadf83bc0a471b2363b9cc18\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"09aea49fbc7e755a915c405644f347137cdb62b0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e1a10ef7fa876f8510aaec36ea5c0cf34baba410\", \"lessThan\": \"c8770db2d54437a5f49417ae7b46f7de23d14db6\", \"versionType\": \"git\"}], \"programFiles\": [\"include/net/tcp.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"include/net/tcp.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ad4f0a14d6856e68f023fc4e5017cfd881a3dfbc\"}, {\"url\": \"https://git.kernel.org/stable/c/16e0387d87fc858e34449fdf2b14ed5837f761db\"}, {\"url\": \"https://git.kernel.org/stable/c/ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86\"}, {\"url\": \"https://git.kernel.org/stable/c/5c4c03288a4aea705e36aa44119c13d7ee4dce99\"}, {\"url\": \"https://git.kernel.org/stable/c/96c4983eab2a5da235f7fff90beaf17b008ba029\"}, {\"url\": \"https://git.kernel.org/stable/c/570f7d8c9bf14f041152ba8353d4330ef7575915\"}, {\"url\": \"https://git.kernel.org/stable/c/81d18c152e3f82bacadf83bc0a471b2363b9cc18\"}, {\"url\": \"https://git.kernel.org/stable/c/09aea49fbc7e755a915c405644f347137cdb62b0\"}, {\"url\": \"https://git.kernel.org/stable/c/c8770db2d54437a5f49417ae7b46f7de23d14db6\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntcp: check skb is non-NULL in tcp_rto_delta_us()\\n\\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\\nkernel that are running ceph and recently hit a null ptr dereference in\\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\\nsaw it getting hit from the RACK case as well. Here are examples of the oops\\nmessages we saw in each of those cases:\\n\\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\\nJul 26 15:05:02 rx [11061395.919488]\\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\\n---truncated---\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:25:57.237Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47684\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:25:57.237Z\", \"dateReserved\": \"2024-09-30T16:00:12.941Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T11:53:25.787Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.