Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: fix runtime PM underflow Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled") caused unbalanced pm_runtime_get/put() calls when the bam is controlled remotely. This commit reverts it and just enables pm_runtime in all cases, the clk_* functions already just nop when the clock is NULL. Also clean up a bit by removing unnecessary bamclk null checks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.17.1, < 5.15.54 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0ac9c3dd0d6fe293cd5044cfad10bec27d171e4ePatch
- https://git.kernel.org/stable/c/2f6ded79068cac8cff41d5d5632564165d98ee12Patch
- https://git.kernel.org/stable/c/b702a1077b51fcb39507cc3bd39206f539319a96Patch
FAQ
What is CVE-2022-49650?
CVE-2022-49650 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: fix runtime PM underflow Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled...
How severe is CVE-2022-49650?
CVE-2022-49650 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49650?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.