Metrics
Affected Vendors & Products
Tue, 25 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Tue, 04 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-416 | |
Metrics |
cvssV3_1
|
ssvc
|
Wed, 26 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list. | |
Title | net: hns3: add vlan list lock to protect vlan list | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:55:33.574Z
Updated: 2025-03-04T18:07:17.957Z
Reserved: 2025-02-26T01:49:39.283Z
Link: CVE-2022-49182

Updated: 2025-03-04T18:04:21.337Z

Status : Analyzed
Published: 2025-02-26T07:00:55.333
Modified: 2025-03-25T15:07:11.573
Link: CVE-2022-49182
