CVE-2022-50039
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper clock management in the Linux kernel's stmmac Intel Ethernet driver. Specifically, a missing call to clk_disable_unprepare() in the intel_eth_pci_remove() function can lead to incorrect handling of hardware clocks when the driver is unloaded. Previous commits removed or altered this call, causing potential kernel panics or instability during driver removal. The fix restores the missing clk_disable_unprepare() call to ensure proper clock handling and prevent system crashes.
How can this vulnerability impact me? :
If this vulnerability is present, unloading the dwmac-intel driver could cause a kernel panic due to improper clock management. This can lead to system instability, crashes, or denial of service, affecting the reliability and availability of systems using the affected Linux kernel driver.