
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49367 affects the Linux kernel, specifically involving a refcount leak in the mv88e6xxx_mdios_register function. The vulnerability occurs because of_get_child_by_name() returns a node pointer with refcount incremented, but the code was missing the necessary of_node_put() call when done with the device node (Kernel Git).
The technical issue lies in the mv88e6xxx_mdio_register() function which passes the device node to of_mdiobus_register(). After this operation, the device node is no longer needed, but the code failed to call of_node_put() to properly decrement the reference count. This oversight results in a reference count leak in the kernel's memory management system (Kernel Git).
The vulnerability results in a reference count leak in the Linux kernel's memory management system, which could potentially lead to resource exhaustion over time. This affects systems using the mv88e6xxx DSA (Distributed Switch Architecture) driver (NVD).
The issue has been fixed by adding the missing of_node_put() call after mv88e6xxx_mdio_register(). The fix has been incorporated into various Linux kernel versions. Users should update their kernel to a patched version (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."