CVE-2022-50624Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: net: netsec: fix error handling in netsec_register_mdio() If phy_device_register() fails, phy_device_free() need be called to put refcount, so memory of phy device and device name can be freed in callback function. If get_phy_device() fails, mdiobus_unregister() need be called, or it will cause warning in mdiobus_free() and kobject is leaked.

Affected Packages4 packages

Linuxlinux/linux_kernel4.16.04.19.264+4
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux533dd11a12f698c571a12271b20f235792d3e148728884b22d83148a330b23f9472f1e118b589211+6
debiandebian/linux< linux 6.0.7-1 (bookworm)

🔴Vulnerability Details

3
OSV
net: netsec: fix error handling in netsec_register_mdio()2025-12-08
OSV
CVE-2022-50624: In the Linux kernel, the following vulnerability has been resolved: net: netsec: fix error handling in netsec_register_mdio() If phy_device_register()2025-12-08
GHSA
GHSA-r2g2-5w3q-5hqj: In the Linux kernel, the following vulnerability has been resolved: net: netsec: fix error handling in netsec_register_mdio() If phy_device_register2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: net: netsec: fix error handling in netsec_register_mdio()2025-12-08
Debian
CVE-2022-50624: linux - In the Linux kernel, the following vulnerability has been resolved: net: netsec...2022