CVE-2022-50624

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net: netsec: fix error handling in netsec_register_mdio() If phy_device_register() fails, phy_device_free() need be called to put refcount, so memory of phy device and device name can be freed in callback function. If get_phy_device() fails, mdiobus_unregister() need be called, or it will cause warning in mdiobus_free() and kobject is leaked.

References

https://git.kernel.org/stable/c/fda2d07234a21be4d71ebfe97a45f499726902d6

https://git.kernel.org/stable/c/94423589689124e8cd145b38a1034be7f25835b2

https://git.kernel.org/stable/c/846e677daf51220d7975c61a20e440a88473951e

https://git.kernel.org/stable/c/728884b22d83148a330b23f9472f1e118b589211

https://git.kernel.org/stable/c/62f0a08e82a6312efd7df7f595c0b11d4ffde610

https://git.kernel.org/stable/c/1e0bee973ef6fc3c1e3acb014515eaea37c8fa17

Details

Source: Mitre, NVD

Published: 2025-12-08

Updated: 2025-12-08

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00024