
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50063 is a vulnerability in the Linux kernel's Distributed Switch Architecture (DSA) subsystem, specifically affecting the Felix driver's handling of tagging protocol changes. The vulnerability was discovered in June 2025 and affects the way dsa_tree_change_tag_proto() handles failures during tag protocol changes (NVD, Wiz).
The vulnerability occurs when dsa_tree_notify() fails and cannot determine if the failure happened mid-way in a multi-switch tree or in a single-switch tree. This leads to the Felix driver receiving duplicate calls to dsa_tag_8021q_register() without proper unregistration in between, potentially corrupting data structures. The issue can be triggered by forcing an error while in tag_8021q mode, resulting in a kernel NULL pointer dereference at virtual address 0x14 (Debian Tracker, Wiz).
When exploited, this vulnerability can cause a kernel crash due to NULL pointer dereference, leading to system instability and potential denial of service. The issue affects the operational status of network ports managed by the Felix driver (Wiz).
The vulnerability has been fixed in various Linux kernel versions. Debian has addressed this in multiple releases: bullseye (5.10.237-1), bookworm (6.1.140-1), and trixie (6.12.31-1) (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."