In the Linux kernel, the following vulnerability has been resolved: net: netsec: fix error handling in netsec_register_mdio() If phy_device_register() fails, phy_device_free() need be called to put refcount, so memory of phy device and device name can be freed in callback function. If get_phy_device() fails, mdiobus_unregister() need be called, or it will cause warning in mdiobus_free() and kobject is leaked.
https://git.kernel.org/stable/c/fda2d07234a21be4d71ebfe97a45f499726902d6
https://git.kernel.org/stable/c/94423589689124e8cd145b38a1034be7f25835b2
https://git.kernel.org/stable/c/846e677daf51220d7975c61a20e440a88473951e
https://git.kernel.org/stable/c/728884b22d83148a330b23f9472f1e118b589211
https://git.kernel.org/stable/c/62f0a08e82a6312efd7df7f595c0b11d4ffde610
https://git.kernel.org/stable/c/1e0bee973ef6fc3c1e3acb014515eaea37c8fa17