Executive Summary

Informations
Name CVE-2022-49182 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: hns3: add vlan list lock to protect vlan list

When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49182

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3527

Sources (Detail)

https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97
https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725
https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758
https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2025-06-26 02:09:19
  • Multiple Updates
2025-06-25 12:22:10
  • Multiple Updates
2025-06-24 02:13:55
  • Multiple Updates
2025-05-27 02:09:30
  • Multiple Updates
2025-03-28 17:21:03
  • Multiple Updates
2025-03-28 13:34:43
  • Multiple Updates
2025-03-28 02:56:49
  • Multiple Updates
2025-03-25 17:21:39
  • Multiple Updates
2025-03-04 21:20:35
  • Multiple Updates
2025-02-26 17:20:33
  • First insertion