CVE-2022-49182

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 15:07

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725 - () https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725 - Patch
References () https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd - () https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd - Patch
References () https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97 - () https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97 - Patch
References () https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758 - () https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758 - Patch

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-25 15:07


NVD link : CVE-2022-49182

Mitre link : CVE-2022-49182


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.