vulnerability
Ubuntu: (CVE-2022-50039): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jun 18, 2025 | Jun 26, 2025 | Nov 14, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()
Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove
paths") removed this clk_disable_unprepare()
This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock
handling on remove path") which removed this clk_disable_unprepare()
because:
"
While unloading the dwmac-intel driver, clk_disable_unprepare() is
being called twice in stmmac_dvr_remove() and
intel_eth_pci_remove(). This causes kernel panic on the second call.
"
However later on, commit 5ec55823438e8 ("net: stmmac: add clocks management
for gmac driver") has updated stmmac_dvr_remove() which do not call
clk_disable_unprepare() anymore.
So this call should now be called from intel_eth_pci_remove().
Solutions
References
- CVE-2022-50039
- https://attackerkb.com/topics/CVE-2022-50039
- URL-https://git.kernel.org/stable/c/02f3642d8e657c05f382729c165bed46745dc18c
- URL-https://git.kernel.org/stable/c/47129531196054b374017555165b47a43cdb6f41
- URL-https://git.kernel.org/stable/c/5c23d6b717e4e956376f3852b90f58e262946b50
- URL-https://git.kernel.org/stable/c/9400aeb419d35e718e90aa14a97c11229d0a40bc
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50039
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.