We found results for “”
WS-2021-0566
Good to know:
Date: December 27, 2021
net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 4f4a353f6fe033807cd026a5de81c67469ff19b0, it was introduced in version v5.8 by commit d8355240cf8fb8b9e002b5c8458578435cea85c2. For more details please see the references link.
Language: C
Severity Score
Severity Score
Weakness Type (CWE)
Use After Free
CWE-416Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |