CVE-2022-49650
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: bam_dma: fix runtime PM underflow
Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled")
caused unbalanced pm_runtime_get/put() calls when the bam is
controlled remotely. This commit reverts it and just enables pm_runtime
in all cases, the clk_* functions already just nop when the clock is NULL.
Also clean up a bit by removing unnecessary bamclk null checks.| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.17.1 ≤ 𝑥 < 5.15.54 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.11 |
| linux | linux_kernel | 4.17 |
| linux | linux_kernel | 4.17:rc6 |
| linux | linux_kernel | 4.17:rc7 |
| linux | linux_kernel | 5.19:rc1 |
| linux | linux_kernel | 5.19:rc2 |
| linux | linux_kernel | 5.19:rc3 |
| linux | linux_kernel | 5.19:rc4 |
| linux | linux_kernel | 5.19:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration