CVE-2022-48815
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
06/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: bcm_sf2: don&#39;t use devres for mdiobus<br />
<br />
As explained in commits:<br />
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")<br />
5135e96a3dd2 ("net: dsa: don&#39;t allocate the slave_mii_bus using devres")<br />
<br />
mdiobus_free() will panic when called from devm_mdiobus_free() shutdown) do not apply. But there is one more which<br />
applies here.<br />
<br />
If the DSA master itself is on a bus that calls ->remove from ->shutdown<br />
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link<br />
between the switch and the DSA master, and device_links_unbind_consumers()<br />
will unbind the bcm_sf2 switch driver on shutdown.<br />
<br />
So the same treatment must be applied to all DSA switch drivers, which<br />
is: either use devres for both the mdiobus allocation and registration,<br />
or don&#39;t use devres at all.<br />
<br />
The bcm_sf2 driver has the code structure in place for orderly mdiobus<br />
removal, so just replace devm_mdiobus_alloc() with the non-devres<br />
variant, and add manual free where necessary, to ensure that we don&#39;t<br />
let devres free a still-registered bus.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08e1a3554e99a1a5bd2835907381e2383ee85cae
- https://git.kernel.org/stable/c/08f1a20822349004bb9cc1b153ecb516e9f2889d
- https://git.kernel.org/stable/c/2770b795294ed312375c11ef1d0b810499c66b83
- https://git.kernel.org/stable/c/caabb5f64f5c32fceed93356bb688ef1ec6c5783
- https://git.kernel.org/stable/c/08e1a3554e99a1a5bd2835907381e2383ee85cae
- https://git.kernel.org/stable/c/08f1a20822349004bb9cc1b153ecb516e9f2889d
- https://git.kernel.org/stable/c/2770b795294ed312375c11ef1d0b810499c66b83
- https://git.kernel.org/stable/c/caabb5f64f5c32fceed93356bb688ef1ec6c5783



