CVE-2022-48812
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
03/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: lantiq_gswip: don&#39;t use devres for mdiobus<br />
<br />
As explained in commits:<br />
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")<br />
5135e96a3dd2 ("net: dsa: don&#39;t allocate the slave_mii_bus using devres")<br />
<br />
mdiobus_free() will panic when called from devm_mdiobus_free() shutdown) do not apply. But there is one more which applies here.<br />
<br />
If the DSA master itself is on a bus that calls ->remove from ->shutdown<br />
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link<br />
between the switch and the DSA master, and device_links_unbind_consumers()<br />
will unbind the GSWIP switch driver on shutdown.<br />
<br />
So the same treatment must be applied to all DSA switch drivers, which<br />
is: either use devres for both the mdiobus allocation and registration,<br />
or don&#39;t use devres at all.<br />
<br />
The gswip driver has the code structure in place for orderly mdiobus<br />
removal, so just replace devm_mdiobus_alloc() with the non-devres<br />
variant, and add manual free where necessary, to ensure that we don&#39;t<br />
let devres free a still-registered bus.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d120dfb5d67edc5bcd1804e167dba2b30809afd
- https://git.kernel.org/stable/c/2443ba2fe396bdde187a2fdfa6a57375643ae93c
- https://git.kernel.org/stable/c/b5652bc50dde7b84e93dfb25479b64b817e377c1
- https://git.kernel.org/stable/c/e177d2e85ebcd3008c4b2abc293f4118e04eedef
- https://git.kernel.org/stable/c/0d120dfb5d67edc5bcd1804e167dba2b30809afd
- https://git.kernel.org/stable/c/2443ba2fe396bdde187a2fdfa6a57375643ae93c
- https://git.kernel.org/stable/c/b5652bc50dde7b84e93dfb25479b64b817e377c1
- https://git.kernel.org/stable/c/e177d2e85ebcd3008c4b2abc293f4118e04eedef



