CVE-2022-50039

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50039
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50039.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50039
Downstream
Related
Published
2025-06-18T11:01:40Z
Modified
2025-10-14T00:29:20.004013Z
Summary
stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

stmmac: intel: Add a missing clkdisableunprepare() call in intelethpci_remove()

Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove paths") removed this clkdisableunprepare()

This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock handling on remove path") which removed this clkdisableunprepare() because: " While unloading the dwmac-intel driver, clkdisableunprepare() is being called twice in stmmacdvrremove() and intelethpci_remove(). This causes kernel panic on the second call. "

However later on, commit 5ec55823438e8 ("net: stmmac: add clocks management for gmac driver") has updated stmmacdvrremove() which do not call clkdisableunprepare() anymore.

So this call should now be called from intelethpci_remove().

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3afe11be6435e126f1507ddf1a9d0e5a0d90b336
Fixed
02f3642d8e657c05f382729c165bed46745dc18c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ec55823438e850c91c6b92aec93fb04ebde29e2
Fixed
47129531196054b374017555165b47a43cdb6f41
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ec55823438e850c91c6b92aec93fb04ebde29e2
Fixed
9400aeb419d35e718e90aa14a97c11229d0a40bc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ec55823438e850c91c6b92aec93fb04ebde29e2
Fixed
5c23d6b717e4e956376f3852b90f58e262946b50

Affected versions

v5.*

v5.10.100
v5.10.101
v5.10.102
v5.10.103
v5.10.104
v5.10.105
v5.10.106
v5.10.107
v5.10.108
v5.10.109
v5.10.110
v5.10.111
v5.10.112
v5.10.113
v5.10.114
v5.10.115
v5.10.116
v5.10.117
v5.10.118
v5.10.119
v5.10.120
v5.10.121
v5.10.122
v5.10.123
v5.10.124
v5.10.125
v5.10.126
v5.10.127
v5.10.128
v5.10.129
v5.10.130
v5.10.131
v5.10.132
v5.10.133
v5.10.134
v5.10.135
v5.10.136
v5.10.137
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.12
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.2
v5.19.3

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2022-50039-029833cb",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9400aeb419d35e718e90aa14a97c11229d0a40bc",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "218634742701103969138248123205758630704",
                    "136333173539745429615652031709205267125",
                    "206487923930959306117496086896727130169"
                ]
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c"
            }
        },
        {
            "id": "CVE-2022-50039-284c7394",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5c23d6b717e4e956376f3852b90f58e262946b50",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "218634742701103969138248123205758630704",
                    "136333173539745429615652031709205267125",
                    "206487923930959306117496086896727130169"
                ]
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c"
            }
        },
        {
            "id": "CVE-2022-50039-3e3ff5a7",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5c23d6b717e4e956376f3852b90f58e262946b50",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Function",
            "digest": {
                "length": 229.0,
                "function_hash": "44697010451896979641775754424570783503"
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c",
                "function": "intel_eth_pci_remove"
            }
        },
        {
            "id": "CVE-2022-50039-5d460814",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02f3642d8e657c05f382729c165bed46745dc18c",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "264331520918885438856527089981303129113",
                    "187532357505855706258592083418343145387",
                    "27819782501465577813893651783092022061"
                ]
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c"
            }
        },
        {
            "id": "CVE-2022-50039-b8bc8123",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@47129531196054b374017555165b47a43cdb6f41",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Function",
            "digest": {
                "length": 229.0,
                "function_hash": "44697010451896979641775754424570783503"
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c",
                "function": "intel_eth_pci_remove"
            }
        },
        {
            "id": "CVE-2022-50039-d3923b6b",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02f3642d8e657c05f382729c165bed46745dc18c",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Function",
            "digest": {
                "length": 271.0,
                "function_hash": "122313658700883970231621221126336282114"
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c",
                "function": "intel_eth_pci_remove"
            }
        },
        {
            "id": "CVE-2022-50039-da572bd1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@47129531196054b374017555165b47a43cdb6f41",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "218634742701103969138248123205758630704",
                    "136333173539745429615652031709205267125",
                    "206487923930959306117496086896727130169"
                ]
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c"
            }
        },
        {
            "id": "CVE-2022-50039-f3b02835",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9400aeb419d35e718e90aa14a97c11229d0a40bc",
            "deprecated": false,
            "signature_version": "v1",
            "signature_type": "Function",
            "digest": {
                "length": 229.0,
                "function_hash": "44697010451896979641775754424570783503"
            },
            "target": {
                "file": "drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c",
                "function": "intel_eth_pci_remove"
            }
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.138
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.63
Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.19.4