VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2022-50624

CVE-2022-50624

Description

In the Linux kernel, the following vulnerability has been resolved:

net: netsec: fix error handling in netsec_register_mdio()

If phy_device_register() fails, phy_device_free() need be called to put refcount, so memory of phy device and device name can be freed in callback function.

If get_phy_device() fails, mdiobus_unregister() need be called, or it will cause warning in mdiobus_free() and kobject is leaked.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper error handling in Linux kernel's netsec driver can cause memory leaks when MDIO registration fails.

Vulnerability

In the Linux kernel's netsec driver, the netsec_register_mdio() function lacks proper cleanup on error paths. If phy_device_register() fails, phy_device_free() is not called, resulting in a memory leak of the PHY device and its name. Similarly, if get_phy_device() fails, mdiobus_unregister() is omitted, leading to a warning in mdiobus_free() and a kobject leak [1][2][3].

Exploitation

This issue is triggerable during driver initialization when MDIO bus registration encounters errors. An attacker with local access could potentially induce such failures by manipulating system resources or hardware state, causing repeated driver probing to exhaust kernel memory. No special privileges beyond local access are required.

Impact

A local attacker could exploit this to cause denial of service by leaking kernel memory and kobjects, potentially leading to system instability or crash.

Mitigation

Patches have been applied to the Linux kernel stable tree. The fix ensures that phy_device_free() is called after phy_device_register() failure and mdiobus_unregister() is called after get_phy_device() failure. Users should update to a patched kernel version.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.