CVE-2022-49367

In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. mv88e6xxx_mdio_register() pass the device node to of_mdiobus_register(). We don't need the device node after it. Add missing of_node_put() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:42

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/02ded5a173619b11728b8bf75a3fd995a2c1ff28 - () https://git.kernel.org/stable/c/02ded5a173619b11728b8bf75a3fd995a2c1ff28 - Patch
References () https://git.kernel.org/stable/c/42658e47f1abbbe592007d3ba303de466114d0bb - () https://git.kernel.org/stable/c/42658e47f1abbbe592007d3ba303de466114d0bb - Patch
References () https://git.kernel.org/stable/c/86c3c5f8e4bd1325e24f6fba9017cade29933377 - () https://git.kernel.org/stable/c/86c3c5f8e4bd1325e24f6fba9017cade29933377 - Patch
References () https://git.kernel.org/stable/c/8a1a1255152da4fb934290e7ababc66f24985520 - () https://git.kernel.org/stable/c/8a1a1255152da4fb934290e7ababc66f24985520 - Patch
References () https://git.kernel.org/stable/c/a101793994c0a14c70bb4e44c7fda597eeebba0a - () https://git.kernel.org/stable/c/a101793994c0a14c70bb4e44c7fda597eeebba0a - Patch
References () https://git.kernel.org/stable/c/c1df9cb756e5a9ba1841648c44ee5d92306b9c65 - () https://git.kernel.org/stable/c/c1df9cb756e5a9ba1841648c44ee5d92306b9c65 - Patch
References () https://git.kernel.org/stable/c/dc1cf8c6f9793546696fded437a5b4c84944c48b - () https://git.kernel.org/stable/c/dc1cf8c6f9793546696fded437a5b4c84944c48b - Patch
References () https://git.kernel.org/stable/c/e0d763d0c7665c7897e4f5a0847ab0c82543345f - () https://git.kernel.org/stable/c/e0d763d0c7665c7897e4f5a0847ab0c82543345f - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mv88e6xxx: Se corrige la fuga de refcount en mv88e6xxx_mdios_register of_get_child_by_name() devuelve un puntero de nodo con refcount incrementado, deberíamos usar of_node_put() en él cuando haya terminado. mv88e6xxx_mdio_register() pasa el nodo del dispositivo a of_mdiobus_register(). No necesitamos el nodo del dispositivo después de él. Agregue of_node_put() faltante para evitar la fuga de refcount.
CWE NVD-CWE-Other

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:42


NVD link : CVE-2022-49367

Mitre link : CVE-2022-49367

CVE.ORG link : CVE-2022-49367


JSON object : View

Products Affected

linux

  • linux_kernel