First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.1<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49182 is rated as a medium severity vulnerability in the Linux kernel.
To fix CVE-2022-49182, you should update your Linux kernel to a version that includes the patch for this vulnerability.
CVE-2022-49182 affects the VLAN handling in specific versions of the Linux kernel.
Failure to address CVE-2022-49182 could lead to the potential for exploitation that compromises the integrity of VLAN configurations.
Yes, CVE-2022-49182 affects certain versions of the Linux kernel, specifically those prior to the patched versions.