lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025122400-CVE-2022-50777-d1e3@gregkh>
Date: Wed, 24 Dec 2025 14:06:28 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50777: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe

of_phy_find_device() return device node with refcount incremented.
Call put_device() to relese it when not needed anymore.

The Linux kernel CVE team has assigned CVE-2022-50777 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.14.74 with commit 3f7056e1822d648f8022997497edc6cad2ad1e73 and fixed in 4.14.303 with commit 53526dbc8aa6b95e9fc2ab1e29b1a9145721da24
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 4.19.270 with commit 78b0b1ff525d9be4babf5a148a4de0d50042d95d
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 5.4.229 with commit 00616bd1913a4f879679e02dc08c2f501ca2bd4c
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 5.10.163 with commit 106d0d33c9d1ec4ddeeffc1fdc717ff09953d4ed
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 5.15.87 with commit 4d112f001612c79927c1ecf29522b34c4fa292e0
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 6.0.19 with commit 52841e71253e6ace72751c72560950474a57d04c
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 6.1.5 with commit ee84d37a5f08ed1121cdd16f8f3ed87552087a21
	Issue introduced in 4.19 with commit ab4e6ee578e88a659938db8fbf33720bc048d29c and fixed in 6.2 with commit d039535850ee47079d59527e96be18d8e0daa84b
	Issue introduced in 4.9.131 with commit a5a849c9e8a6c357f84a5e249cb468f20da6d28f
	Issue introduced in 4.18.12 with commit 900812a0d318954400d20b0190c7d788b4ff2cc2

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-50777
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/phy/xilinx_gmii2rgmii.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/53526dbc8aa6b95e9fc2ab1e29b1a9145721da24
	https://git.kernel.org/stable/c/78b0b1ff525d9be4babf5a148a4de0d50042d95d
	https://git.kernel.org/stable/c/00616bd1913a4f879679e02dc08c2f501ca2bd4c
	https://git.kernel.org/stable/c/106d0d33c9d1ec4ddeeffc1fdc717ff09953d4ed
	https://git.kernel.org/stable/c/4d112f001612c79927c1ecf29522b34c4fa292e0
	https://git.kernel.org/stable/c/52841e71253e6ace72751c72560950474a57d04c
	https://git.kernel.org/stable/c/ee84d37a5f08ed1121cdd16f8f3ed87552087a21
	https://git.kernel.org/stable/c/d039535850ee47079d59527e96be18d8e0daa84b

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ