Cyber Posture

CVE-2022-49182

High

Published: 26 February 2025

Published
26 February 2025
Modified
25 March 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 4.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add vlan list lock to protect vlan list When adding port base VLAN, vf VLAN need to remove from HW and modify the vlan state in vf VLAN list as false. If the periodicity task is freeing the same node, it may cause "use after free" error. This patch adds a vlan list lock to protect the vlan list.

Security Summary

CVE-2022-49182 is a use-after-free vulnerability (CWE-416) in the Linux kernel's hns3 network driver. The issue arises when adding a port-based VLAN, which requires removing a VF VLAN from hardware and setting its state to false in the VF VLAN list. Without proper synchronization, a concurrent periodic task may free the same node, resulting in a use-after-free condition. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation could lead to high impacts on confidentiality, integrity, and availability, potentially allowing arbitrary code execution or system crashes within the kernel context.

Kernel advisories provide mitigation through patches that introduce a VLAN list lock to synchronize access and prevent the race condition. These fixes are available in stable kernel trees via commits such as 09e383ca97e798f9954189b741af54b5c51e7a97, 1932a624ab88ff407d1a1d567fe581faa15dc725, 30f0ff7176efe8ac6c55f85bce26ed58bb608758, and f58af41deeab0f45c9c80adf5f2de489ebbac3dd on git.kernel.org.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
5.1 — 5.15.33 · 5.16 — 5.16.19 · 5.17 — 5.17.2

References