In the Linux kernel, the following vulnerability has been resolved:
net: dsa: tag8021q: avoid leaking ctx on dsatag8021qregister() error path
If dsatag8021qsetup() fails, for example due to the inability of the device to install a VLAN, the tag8021q context of the switch will leak. Make sure it is freed on the error path.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50837.json"
}