In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.
https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd
https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758
https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725
https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97