๐Ÿ” CVE Alert

CVE-2022-49582

MEDIUM 5.5

net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering The "ds" iterator variable used in dsa_port_reset_vlan_filtering() -> dsa_switch_for_each_port() overwrites the "dp" received as argument, which is later used to call dsa_port_vlan_filtering() proper. As a result, switches which do enter that code path (the ones with vlan_filtering_is_global=true) will dereference an invalid dp in dsa_port_reset_vlan_filtering() after leaving a VLAN-aware bridge. Use a dedicated "other_dp" iterator variable to avoid this from happening.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d0004a020bb50263de0e3e775c7b7c7a003e0e0c < 3240e12fe203a3a79b9814e83327106b770ed7b0 d0004a020bb50263de0e3e775c7b7c7a003e0e0c < 1699b4d502eda3c7ea4070debad3ee570b5091b1
Linux / Linux
5.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3240e12fe203a3a79b9814e83327106b770ed7b0 git.kernel.org: https://git.kernel.org/stable/c/1699b4d502eda3c7ea4070debad3ee570b5091b1