CVE-2022-50837

high

Description

In the Linux kernel, the following vulnerability has been resolved: net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path If dsa_tag_8021q_setup() fails, for example due to the inability of the device to install a VLAN, the tag_8021q context of the switch will leak. Make sure it is freed on the error path.

References

https://git.kernel.org/stable/c/e095493091e850d5292ad01d8fbf5cde1d89ac53

https://git.kernel.org/stable/c/39691d51af99f80efb9e365f94b8e0c791fa1a2f

https://git.kernel.org/stable/c/14ed46a13aba42a6ddd85de6f6274090df3586a5

https://git.kernel.org/stable/c/09f30f394e832ed09859b6a80fdd20668a9104ff

Details

Source: Mitre, NVD

Published: 2025-12-30

Updated: 2025-12-31

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00018