CVE-2022-50039

Source
https://cve.org/CVERecord?id=CVE-2022-50039
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50039.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50039
Downstream
Related
Published
2025-06-18T11:01:40.500Z
Modified
2026-03-20T12:24:50.949050Z
Summary
stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

stmmac: intel: Add a missing clkdisableunprepare() call in intelethpci_remove()

Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove paths") removed this clkdisableunprepare()

This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock handling on remove path") which removed this clkdisableunprepare() because: " While unloading the dwmac-intel driver, clkdisableunprepare() is being called twice in stmmacdvrremove() and intelethpci_remove(). This causes kernel panic on the second call. "

However later on, commit 5ec55823438e8 ("net: stmmac: add clocks management for gmac driver") has updated stmmacdvrremove() which do not call clkdisableunprepare() anymore.

So this call should now be called from intelethpci_remove().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50039.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3afe11be6435e126f1507ddf1a9d0e5a0d90b336
Fixed
02f3642d8e657c05f382729c165bed46745dc18c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ec55823438e850c91c6b92aec93fb04ebde29e2
Fixed
47129531196054b374017555165b47a43cdb6f41
Fixed
9400aeb419d35e718e90aa14a97c11229d0a40bc
Fixed
5c23d6b717e4e956376f3852b90f58e262946b50

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50039.json"