112 Star 72 Fork 316

src-openEuler/kernel

CVE-2022-49367

已完成
CVE和安全问题 拥有者
创建于  
2025-02-26 16:28

一、漏洞信息
漏洞编号:CVE-2022-49367
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.1.8,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:5.5 Medium
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_registerof_get_child_by_name() returns a node pointer with refcountincremented, we should use of_node_put() on it when done.mv88e6xxx_mdio_register() pass the device node to of_mdiobus_register().We don t need the device node after it.Add missing of_node_put() to avoid refcount leak.
漏洞公开时间:2025-02-26 15:01:13
漏洞创建时间:2025-02-26 16:28:54
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-49367

更多参考(点击展开)
参考来源 参考链接 来源链接
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/02ded5a173619b11728b8bf75a3fd995a2c1ff28
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/42658e47f1abbbe592007d3ba303de466114d0bb
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/86c3c5f8e4bd1325e24f6fba9017cade29933377
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/8a1a1255152da4fb934290e7ababc66f24985520
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/a101793994c0a14c70bb4e44c7fda597eeebba0a
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/c1df9cb756e5a9ba1841648c44ee5d92306b9c65
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/dc1cf8c6f9793546696fded437a5b4c84944c48b
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e0d763d0c7665c7897e4f5a0847ab0c82543345f
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-49367 https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-49367.mbox https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/dc1cf8c6f9793546696fded437a5b4c84944c48b https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/86c3c5f8e4bd1325e24f6fba9017cade29933377 https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/a101793994c0a14c70bb4e44c7fda597eeebba0a https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/42658e47f1abbbe592007d3ba303de466114d0bb https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/c1df9cb756e5a9ba1841648c44ee5d92306b9c65 https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/e0d763d0c7665c7897e4f5a0847ab0c82543345f https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/8a1a1255152da4fb934290e7ababc66f24985520 https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://git.kernel.org/stable/c/02ded5a173619b11728b8bf75a3fd995a2c1ff28 https://bugzilla.suse.com/show_bug.cgi?id=1238447
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2347986 https://bugzilla.suse.com/show_bug.cgi?id=1238447
redhat_bugzilla https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2022-49367-3b2e@gregkh/T https://bugzilla.redhat.com/show_bug.cgi?id=2347986

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)

二、漏洞分析结构反馈
影响性分析说明:
Reserved.
openEuler评分:
5.5
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP3(5.10.0):不受影响
3.openEuler-22.03-LTS-SP4(5.10.0):不受影响
4.master(6.6.0):不受影响
5.openEuler-24.03-LTS(6.6.0):不受影响
6.openEuler-24.03-LTS-Next(6.6.0):不受影响
7.openEuler-24.03-LTS-SP1(6.6.0):不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP3(5.10.0):否
3.master(6.6.0):否
4.openEuler-24.03-LTS(6.6.0):否
5.openEuler-24.03-LTS-Next(6.6.0):否
6.openEuler-22.03-LTS-SP4(5.10.0):否
7.openEuler-24.03-LTS-SP1(6.6.0):否

原因说明:
1.openEuler-20.03-LTS-SP4(4.19.90):正常修复
2.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
3.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发
4.openEuler-22.03-LTS-SP3(5.10.0):不受影响-漏洞代码不存在
5.openEuler-22.03-LTS-SP4(5.10.0):不受影响-漏洞代码不存在
6.openEuler-24.03-LTS(6.6.0):不受影响-漏洞代码不存在
7.openEuler-24.03-LTS-SP1(6.6.0):不受影响-漏洞代码不存在

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-1370

评论 (8)

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
关联仓库
关联里程碑
关联分支
参与者(1)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

搜索帮助