vulnerability
Ubuntu: (CVE-2022-49016): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 10/21/2024 | 11/19/2024 | 02/11/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
net: mdiobus: fix unbalanced node reference count
I got the following report while doing device(mscc-miim) load test
with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled:
OF: ERROR: memory leak, expected refcount 1 instead of 2,
of_node_get()/of_node_put() unbalanced - destroy cset entry:
attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0
If the 'fwnode' is not an acpi node, the refcount is get in
fwnode_mdiobus_phy_device_register(), but it has never been
put when the device is freed in the normal path. So call
fwnode_handle_put() in phy_device_release() to avoid leak.
If it's an acpi node, it has never been get, but it's put
in the error path, so call fwnode_handle_get() before
phy_device_register() to keep get/put operation balanced.
Solution(s)
References
- CVE-2022-49016
- https://attackerkb.com/topics/CVE-2022-49016
- URL-https://git.kernel.org/linus/cdde1560118f82498fc9e9a7c1ef7f0ef7755891
- URL-https://git.kernel.org/stable/c/2708b357440427d6a9fee667eb7b8307f4625adc
- URL-https://git.kernel.org/stable/c/543d917f691ab06885ee779c862065899eaa4251
- URL-https://git.kernel.org/stable/c/cdde1560118f82498fc9e9a7c1ef7f0ef7755891
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49016

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.