CVE-2022-49182

high

Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.

References

https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd

https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758

https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725

https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97

Details

Source: Mitre, NVD

Published: 2025-02-26

Updated: 2025-03-04

Risk Information

CVSS v2

Base Score: 6.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High