In the Linux kernel, the following vulnerability has been resolved:
net: hns3: add vlan list lock to protect vlan list
When adding port base VLAN, vf VLAN need to remove from HW and modify
the vlan state in vf VLAN list as false. If the periodicity task is
freeing the same node, it may cause "use after free" error.
This patch adds a vlan list lock to protect the vlan list.
CVSS
No CVSS.
References
Configurations
Configuration 1 (hide)
|
History
25 Mar 2025, 15:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725 - Patch | |
References | () https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd - Patch | |
References | () https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97 - Patch | |
References | () https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758 - Patch |
26 Feb 2025, 07:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:00
Updated : 2025-03-25 15:07
NVD link : CVE-2022-49182
Mitre link : CVE-2022-49182
JSON object : View
Products Affected
linux
- linux_kernel
CWE
No CWE.