Bug 2347699 (CVE-2022-49582) - CVE-2022-49582 kernel: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering
Summary: CVE-2022-49582 kernel: net: dsa: fix NULL pointer dereference in dsa_port_res...
Keywords:
Status: NEW
Alias: CVE-2022-49582
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:03 UTC by OSIDB Bzimport
Modified: 2025-02-26 19:07 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:03:39 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering

The "ds" iterator variable used in dsa_port_reset_vlan_filtering() ->
dsa_switch_for_each_port() overwrites the "dp" received as argument,
which is later used to call dsa_port_vlan_filtering() proper.

As a result, switches which do enter that code path (the ones with
vlan_filtering_is_global=true) will dereference an invalid dp in
dsa_port_reset_vlan_filtering() after leaving a VLAN-aware bridge.

Use a dedicated "other_dp" iterator variable to avoid this from
happening.

Comment 1 Avinash Hanwate 2025-02-26 19:01:38 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49582-8f09@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.