In the Linux kernel, the following vulnerability has been resolved:
net: hns3: add vlan list lock to protect vlan list
When adding port base VLAN, vf VLAN need to remove from HW and modify
the vlan state in vf VLAN list as false. If the periodicity task is
freeing the same node, it may cause "use after free" error.
This patch adds a vlan list lock to protect the vlan list.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-416 | |
Metrics |
cvssV3_1
|
ssvc
|
Wed, 26 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list. | |
Title | net: hns3: add vlan list lock to protect vlan list | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:55:33.574Z
Updated: 2025-03-04T18:07:17.957Z
Reserved: 2025-02-26T01:49:39.283Z
Link: CVE-2022-49182

Updated: 2025-03-04T18:04:21.337Z

Status : Awaiting Analysis
Published: 2025-02-26T07:00:55.333
Modified: 2025-03-04T18:15:22.983
Link: CVE-2022-49182
