In the Linux kernel, the following vulnerability has been resolved: net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path If dsa_tag_8021q_setup() fails, for example due to the inability of the device to install a VLAN, the tag_8021q context of the switch will leak. Make sure it is freed on the error path.
https://git.kernel.org/stable/c/e095493091e850d5292ad01d8fbf5cde1d89ac53
https://git.kernel.org/stable/c/39691d51af99f80efb9e365f94b8e0c791fa1a2f
https://git.kernel.org/stable/c/14ed46a13aba42a6ddd85de6f6274090df3586a5
https://git.kernel.org/stable/c/09f30f394e832ed09859b6a80fdd20668a9104ff