CVE-2022-50777
Description
In the Linux kernel, the following vulnerability has been resolved:
net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe
of_phy_find_device() return device node with refcount incremented. Call put_device() to relese it when not needed anymore.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A refcount leak in the Linux kernel's XGMII-to-RGMII PHY driver could lead to memory leaks or use-after-free; fixed by adding a put_device() call.
Vulnerability
CVE-2022-50777 is a refcount leak in the Linux kernel's xgmiitorgmii PHY driver. The function xgmiitorgmii_probe calls of_phy_find_device() which returns a device node with an incremented reference count. The driver failed to call put_device()` to release the reference when it was no longer needed, leading to a reference count leak [1].
Exploitation
An attacker with local access or the ability to trigger PHY device probing could exploit this leak. The vulnerability is triggered during the probe of the XGMII-to-RGMII converter, which is typically used in network interfaces. No special privileges beyond the ability to cause device enumeration are required [2].
Impact
A persistent reference count leak can lead to memory exhaustion over time, potentially causing a denial of service (DoS). In some cases, the leaked reference could also prevents proper cleanup, which could lead to use-after-free scenarios if the device is removed and re-probed [3].
Mitigation
The fix was applied in Linux kernel stable releases. The commit adds a put_device() call after the device is no longer needed, ensuring the reference count is properly decremented. Users should update to a kernel version containing the fix [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
853526dbc8aa678b0b1ff525d00616bd1913a106d0d33c9d14d112f00161252841e71253eee84d37a5f08d039535850eeVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/00616bd1913a4f879679e02dc08c2f501ca2bd4cnvd
- git.kernel.org/stable/c/106d0d33c9d1ec4ddeeffc1fdc717ff09953d4ednvd
- git.kernel.org/stable/c/4d112f001612c79927c1ecf29522b34c4fa292e0nvd
- git.kernel.org/stable/c/52841e71253e6ace72751c72560950474a57d04cnvd
- git.kernel.org/stable/c/53526dbc8aa6b95e9fc2ab1e29b1a9145721da24nvd
- git.kernel.org/stable/c/78b0b1ff525d9be4babf5a148a4de0d50042d95dnvd
- git.kernel.org/stable/c/d039535850ee47079d59527e96be18d8e0daa84bnvd
- git.kernel.org/stable/c/ee84d37a5f08ed1121cdd16f8f3ed87552087a21nvd
News mentions
0No linked articles in our index yet.