vulnerability
Ubuntu: (CVE-2022-49182): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Feb 26, 2025 | Mar 19, 2025 | Sep 1, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Feb 26, 2025
Added
Mar 19, 2025
Modified
Sep 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: add vlan list lock to protect vlan list
When adding port base VLAN, vf VLAN need to remove from HW and modify
the vlan state in vf VLAN list as false. If the periodicity task is
freeing the same node, it may cause "use after free" error.
This patch adds a vlan list lock to protect the vlan list.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gkeubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-oracleubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtime
References
- CVE-2022-49182
- https://attackerkb.com/topics/CVE-2022-49182
- CWE-416
- URL-https://git.kernel.org/linus/1932a624ab88ff407d1a1d567fe581faa15dc725
- URL-https://git.kernel.org/stable/c/09e383ca97e798f9954189b741af54b5c51e7a97
- URL-https://git.kernel.org/stable/c/1932a624ab88ff407d1a1d567fe581faa15dc725
- URL-https://git.kernel.org/stable/c/30f0ff7176efe8ac6c55f85bce26ed58bb608758
- URL-https://git.kernel.org/stable/c/f58af41deeab0f45c9c80adf5f2de489ebbac3dd
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49182
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.