CVE-2022-49650

Source
https://cve.org/CVERecord?id=CVE-2022-49650
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49650.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49650
Downstream
Related
Published
2025-02-26T02:23:53.006Z
Modified
2026-03-20T12:22:28.400447Z
Summary
dmaengine: qcom: bam_dma: fix runtime PM underflow
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom: bam_dma: fix runtime PM underflow

Commit dbad41e7bb5f ("dmaengine: qcom: bamdma: check if the runtime pm enabled") caused unbalanced pmruntimeget/put() calls when the bam is controlled remotely. This commit reverts it and just enables pmruntime in all cases, the clk_* functions already just nop when the clock is NULL.

Also clean up a bit by removing unnecessary bamclk null checks.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49650.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dbad41e7bb5f4b9949ff5ea1d76c20711f326308
Fixed
2f6ded79068cac8cff41d5d5632564165d98ee12
Fixed
b702a1077b51fcb39507cc3bd39206f539319a96
Fixed
0ac9c3dd0d6fe293cd5044cfad10bec27d171e4e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49650.json"