CVE-2022-50837
BaseFortify
Publication date: 2025-12-30
Last updated on: 2025-12-31
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the dsa_tag_8021q component. Specifically, if the function dsa_tag_8021q_setup() fails, such as when the device cannot install a VLAN, the tag_8021q context of the switch may leak because it is not properly freed on the error path. This means that resources associated with the tag_8021q context are not released correctly when an error occurs.
How can this vulnerability impact me? :
The impact of this vulnerability is a resource leak in the Linux kernel's network switch tagging mechanism. This could potentially lead to increased memory usage or resource exhaustion on the affected device, which might degrade system performance or stability over time.