CVE-2022-49192
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool<br />
<br />
cpsw_ethtool_begin directly returns the result of pm_runtime_get_sync<br />
when successful.<br />
pm_runtime_get_sync returns -error code on failure and 0 on successful<br />
resume but also 1 when the device is already active. So the common case<br />
for cpsw_ethtool_begin is to return 1. That leads to inconsistent calls<br />
to pm_runtime_put in the call-chain so that pm_runtime_put is called<br />
one too many times and as result leaving the cpsw dev behind suspended.<br />
<br />
The suspended cpsw dev leads to an access violation later on by<br />
different parts of the cpsw driver.<br />
<br />
Fix this by calling the return-friendly pm_runtime_resume_and_get<br />
function.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



