CVE-2022-49926
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
07/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: Fix possible memory leaks in dsa_loop_init()<br />
<br />
kmemleak reported memory leaks in dsa_loop_init():<br />
<br />
kmemleak: 12 new suspected memory leaks<br />
<br />
unreferenced object 0xffff8880138ce000 (size 2048):<br />
comm "modprobe", pid 390, jiffies 4295040478 (age 238.976s)<br />
backtrace:<br />
[] kmalloc_trace+0x26/0x60<br />
[] phy_device_create+0x5d/0x970<br />
[] get_phy_device+0xf3/0x2b0<br />
[] __fixed_phy_register.part.0+0x92/0x4e0<br />
[] fixed_phy_register+0x84/0xb0<br />
[] dsa_loop_init+0xa9/0x116 [dsa_loop]<br />
...<br />
<br />
There are two reasons for memleak in dsa_loop_init().<br />
<br />
First, fixed_phy_register() create and register phy_device:<br />
<br />
fixed_phy_register()<br />
get_phy_device()<br />
phy_device_create() # freed by phy_device_free()<br />
phy_device_register() # freed by phy_device_remove()<br />
<br />
But fixed_phy_unregister() only calls phy_device_remove().<br />
So the memory allocated in phy_device_create() is leaked.<br />
<br />
Second, when mdio_driver_register() fail in dsa_loop_init(),<br />
it just returns and there is no cleanup for phydevs.<br />
<br />
Fix the problems by catching the error of mdio_driver_register()<br />
in dsa_loop_init(), then calling both fixed_phy_unregister() and<br />
phy_device_free() to release phydevs.<br />
Also add a function for phydevs cleanup to avoid duplacate.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 4.14.299 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.265 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.224 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.154 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.78 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.8 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/37a098fc9b42bd7fce66764866aa514639667b6e
- https://git.kernel.org/stable/c/4d2024b138d9f7b02ae13ee997fd3a71e9e46254
- https://git.kernel.org/stable/c/633efc8b3dc96f56f5a57f2a49764853a2fa3f50
- https://git.kernel.org/stable/c/935b4beb724946a37cebf97191592d4879d3a3a3
- https://git.kernel.org/stable/c/9f555b1584fc2d5d16ee3c4d9438e93ac7c502c7
- https://git.kernel.org/stable/c/bbc5d7b46a729bfcbb5544f6612b7a67dd4f4d6f
- https://git.kernel.org/stable/c/d593e1ede655b74c42e4e4fe285ea64aee96fb5c