CVE-2022-49016

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49016
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49016.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49016
Related
Published
2024-10-21T20:15:12Z
Modified
2024-10-24T18:35:01Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

net: mdiobus: fix unbalanced node reference count

I got the following report while doing device(mscc-miim) load test with CONFIGOFUNITTEST and CONFIGOFDYNAMIC enabled:

OF: ERROR: memory leak, expected refcount 1 instead of 2, ofnodeget()/ofnodeput() unbalanced - destroy cset entry: attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0

If the 'fwnode' is not an acpi node, the refcount is get in fwnodemdiobusphydeviceregister(), but it has never been put when the device is freed in the normal path. So call fwnodehandleput() in phydevicerelease() to avoid leak.

If it's an acpi node, it has never been get, but it's put in the error path, so call fwnodehandleget() before phydeviceregister() to keep get/put operation balanced.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}