
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48817 addresses a vulnerability in the Linux kernel's DSA (Distributed Switch Architecture) ar9331 driver. The issue involves improper handling of MDIO bus registration and deregistration, which could lead to a kernel panic when mdiobusfree() is called from devmmdiobus_free() during device driver release (Kernel Git).
The vulnerability occurs when mdiobusfree() is called from devmmdiobusfree() through devresreleaseall() and _devicereleasedriver() sequence, while the MDIO bus was not previously unregistered. This specifically affects scenarios where the DSA master is on a bus that calls ->remove from ->shutdown (like dpaa2-eth on the fsl-mc bus), creating a device link between the switch and DSA master. In such cases, devicelinksunbind_consumers() will unbind the ar9331 switch driver on shutdown (Kernel Git).
When triggered, this vulnerability can cause a kernel panic, potentially leading to system instability and denial of service conditions (NVD).
The issue has been fixed by replacing ofmdiobusregister with the devres variant (devmofmdiobus_register) to ensure consistent resource management. The fix ensures proper registration and deregistration of the MDIO bus using the device resource management framework (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."