CVE-2022-49234
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
26/02/2025
Last modified:
22/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: Avoid cross-chip syncing of VLAN filtering<br />
<br />
Changes to VLAN filtering are not applicable to cross-chip<br />
notifications.<br />
<br />
On a system like this:<br />
<br />
.-----. .-----. .-----.<br />
| sw1 +---+ sw2 +---+ sw3 |<br />
&#39;-1-2-&#39; &#39;-1-2-&#39; &#39;-1-2-&#39;<br />
<br />
Before this change, upon sw1p1 leaving a bridge, a call to<br />
dsa_port_vlan_filtering would also be made to sw2p1 and sw3p1.<br />
<br />
In this scenario:<br />
<br />
.---------. .-----. .-----.<br />
| sw1 +---+ sw2 +---+ sw3 |<br />
&#39;-1-2-3-4-&#39; &#39;-1-2-&#39; &#39;-1-2-&#39;<br />
<br />
When sw1p4 would leave a bridge, dsa_port_vlan_filtering would be<br />
called for sw2 and sw3 with a non-existing port - leading to array<br />
out-of-bounds accesses and crashes on mv88e6xxx.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 5.17.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



