In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: bam_dma: fix runtime PM underflow
Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled")
caused unbalanced pm_runtime_get/put() calls when the bam is
controlled remotely. This commit reverts it and just enables pm_runtime
in all cases, the clk_* functions already just nop when the clock is NULL.
Also clean up a bit by removing unnecessary bamclk null checks.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Feb 2025 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: fix runtime PM underflow Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled") caused unbalanced pm_runtime_get/put() calls when the bam is controlled remotely. This commit reverts it and just enables pm_runtime in all cases, the clk_* functions already just nop when the clock is NULL. Also clean up a bit by removing unnecessary bamclk null checks. | |
Title | dmaengine: qcom: bam_dma: fix runtime PM underflow | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T02:23:53.006Z
Updated: 2025-05-04T08:42:34.836Z
Reserved: 2025-02-26T02:21:30.433Z
Link: CVE-2022-49650

No data.

Status : Received
Published: 2025-02-26T07:01:40.150
Modified: 2025-02-26T07:01:40.150
Link: CVE-2022-49650
