In the Linux kernel, the following vulnerability has been resolved:
stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()
Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove
paths") removed this clk_disable_unprepare()
This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock
handling on remove path") which removed this clk_disable_unprepare()
because:
"
While unloading the dwmac-intel driver, clk_disable_unprepare() is
being called twice in stmmac_dvr_remove() and
intel_eth_pci_remove(). This causes kernel panic on the second call.
"
However later on, commit 5ec55823438e8 ("net: stmmac: add clocks management
for gmac driver") has updated stmmac_dvr_remove() which do not call
clk_disable_unprepare() anymore.
So this call should now be called from intel_eth_pci_remove().
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/02f3642d8e657c05f382729c165bed46745dc18c - Patch | |
| References | () https://git.kernel.org/stable/c/47129531196054b374017555165b47a43cdb6f41 - Patch | |
| References | () https://git.kernel.org/stable/c/5c23d6b717e4e956376f3852b90f58e262946b50 - Patch | |
| References | () https://git.kernel.org/stable/c/9400aeb419d35e718e90aa14a97c11229d0a40bc - Patch | |
| Summary |
|
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-13 18:57
NVD link : CVE-2022-50039
Mitre link : CVE-2022-50039
CVE.ORG link : CVE-2022-50039
JSON object : View
Products Affected
linux
- linux_kernel
CWE
