In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: bam_dma: fix runtime PM underflow
Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled")
caused unbalanced pm_runtime_get/put() calls when the bam is
controlled remotely. This commit reverts it and just enables pm_runtime
in all cases, the clk_* functions already just nop when the clock is NULL.
Also clean up a bit by removing unnecessary bamclk null checks.
References
Configurations
Configuration 1 (hide)
|
History
23 Oct 2025, 12:10
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/0ac9c3dd0d6fe293cd5044cfad10bec27d171e4e - Patch | |
| References | () https://git.kernel.org/stable/c/2f6ded79068cac8cff41d5d5632564165d98ee12 - Patch | |
| References | () https://git.kernel.org/stable/c/b702a1077b51fcb39507cc3bd39206f539319a96 - Patch | |
| CWE | CWE-191 | |
| CPE | cpe:2.3:o:linux:linux_kernel:4.17:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.17:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.17:rc7:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
26 Feb 2025, 07:01
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-23 12:10
NVD link : CVE-2022-49650
Mitre link : CVE-2022-49650
CVE.ORG link : CVE-2022-49650
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
