In the Linux kernel, the following vulnerability has been resolved:
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
cpsw_ethtool_begin directly returns the result of pm_runtime_get_sync
when successful.
pm_runtime_get_sync returns -error code on failure and 0 on successful
resume but also 1 when the device is already active. So the common case
for cpsw_ethtool_begin is to return 1. That leads to inconsistent calls
to pm_runtime_put in the call-chain so that pm_runtime_put is called
one too many times and as result leaving the cpsw dev behind suspended.
The suspended cpsw dev leads to an access violation later on by
different parts of the cpsw driver.
Fix this by calling the return-friendly pm_runtime_resume_and_get
function.
References
Configurations
Configuration 1 (hide)
|
History
21 Oct 2025, 11:56
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/2844e2434385819f674d1fb4130c308c50ba681e - Patch | |
| References | () https://git.kernel.org/stable/c/30ad11bff021a94aff6dab1ec9236fdfd884fbff - Patch | |
| References | () https://git.kernel.org/stable/c/459080fab12b23c0526026e5cedbf3fabb5457cc - Patch | |
| References | () https://git.kernel.org/stable/c/585dc196a08fccdcd1b7fcf473cf566b34c4b840 - Patch | |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
26 Feb 2025, 07:00
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:00
Updated : 2025-10-21 11:56
NVD link : CVE-2022-49192
Mitre link : CVE-2022-49192
CVE.ORG link : CVE-2022-49192
JSON object : View
Products Affected
linux
- linux_kernel
CWE
