CVE-2022-49182
Published: 26 February 2025
Description
In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.
Security Summary
CVE-2022-49182 is a use-after-free vulnerability (CWE-416) in the Linux kernel's hns3 network driver. The issue arises when adding a port-based VLAN, which requires removing a VF VLAN from hardware and setting its state to false in the VF VLAN list. Without proper synchronization, a concurrent periodic task may free the same node, resulting in a use-after-free condition. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation could lead to high impacts on confidentiality, integrity, and availability, potentially allowing arbitrary code execution or system crashes within the kernel context.
Kernel advisories provide mitigation through patches that introduce a VLAN list lock to synchronize access and prevent the race condition. These fixes are available in stable kernel trees via commits such as 09e383ca97e798f9954189b741af54b5c51e7a97, 1932a624ab88ff407d1a1d567fe581faa15dc725, 30f0ff7176efe8ac6c55f85bce26ed58bb608758, and f58af41deeab0f45c9c80adf5f2de489ebbac3dd on git.kernel.org.
Details
- CWE(s)