{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49847","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-01T14:05:17.230Z","datePublished":"2025-05-01T14:10:02.402Z","dateUpdated":"2026-05-11T19:07:54.471Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:07:54.471Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload\n\nMove am65_cpsw_nuss_phylink_cleanup() call to after\nam65_cpsw_nuss_cleanup_ndev() so phylink is still valid\nto prevent the below Segmentation fault on module remove when\nfirst slave link is up.\n\n[   31.652944] Unable to handle kernel paging request at virtual address 00040008000005f4\n[   31.684627] Mem abort info:\n[   31.687446]   ESR = 0x0000000096000004\n[   31.704614]   EC = 0x25: DABT (current EL), IL = 32 bits\n[   31.720663]   SET = 0, FnV = 0\n[   31.723729]   EA = 0, S1PTW = 0\n[   31.740617]   FSC = 0x04: level 0 translation fault\n[   31.756624] Data abort info:\n[   31.759508]   ISV = 0, ISS = 0x00000004\n[   31.776705]   CM = 0, WnR = 0\n[   31.779695] [00040008000005f4] address between user and kernel address ranges\n[   31.808644] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[   31.814928] Modules linked in: wlcore_sdio wl18xx wlcore mac80211 libarc4 cfg80211 rfkill crct10dif_ce phy_gmii_sel ti_am65_cpsw_nuss(-) sch_fq_codel ipv6\n[   31.828776] CPU: 0 PID: 1026 Comm: modprobe Not tainted 6.1.0-rc2-00012-gfabfcf7dafdb-dirty #160\n[   31.837547] Hardware name: Texas Instruments AM625 (DT)\n[   31.842760] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   31.849709] pc : phy_stop+0x18/0xf8\n[   31.853202] lr : phylink_stop+0x38/0xf8\n[   31.857031] sp : ffff80000a0839f0\n[   31.860335] x29: ffff80000a0839f0 x28: ffff000000de1c80 x27: 0000000000000000\n[   31.867462] x26: 0000000000000000 x25: 0000000000000000 x24: ffff80000a083b98\n[   31.874589] x23: 0000000000000800 x22: 0000000000000001 x21: ffff000001bfba90\n[   31.881715] x20: ffff0000015ee000 x19: 0004000800000200 x18: 0000000000000000\n[   31.888842] x17: ffff800076c45000 x16: ffff800008004000 x15: 000058e39660b106\n[   31.895969] x14: 0000000000000144 x13: 0000000000000144 x12: 0000000000000000\n[   31.903095] x11: 000000000000275f x10: 00000000000009e0 x9 : ffff80000a0837d0\n[   31.910222] x8 : ffff000000de26c0 x7 : ffff00007fbd6540 x6 : ffff00007fbd64c0\n[   31.917349] x5 : ffff00007fbd0b10 x4 : ffff00007fbd0b10 x3 : ffff00007fbd3920\n[   31.924476] x2 : d0a07fcff8b8d500 x1 : 0000000000000000 x0 : 0004000800000200\n[   31.931603] Call trace:\n[   31.934042]  phy_stop+0x18/0xf8\n[   31.937177]  phylink_stop+0x38/0xf8\n[   31.940657]  am65_cpsw_nuss_ndo_slave_stop+0x28/0x1e0 [ti_am65_cpsw_nuss]\n[   31.947452]  __dev_close_many+0xa4/0x140\n[   31.951371]  dev_close_many+0x84/0x128\n[   31.955115]  unregister_netdevice_many+0x130/0x6d0\n[   31.959897]  unregister_netdevice_queue+0x94/0xd8\n[   31.964591]  unregister_netdev+0x24/0x38\n[   31.968504]  am65_cpsw_nuss_cleanup_ndev.isra.0+0x48/0x70 [ti_am65_cpsw_nuss]\n[   31.975637]  am65_cpsw_nuss_remove+0x58/0xf8 [ti_am65_cpsw_nuss]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/ti/am65-cpsw-nuss.c"],"versions":[{"version":"e8609e69470f369509b44d5f2619f94541fe9df6","lessThan":"442fd1bfe599bc54d118775e9e1a4fe913e4b369","status":"affected","versionType":"git"},{"version":"e8609e69470f369509b44d5f2619f94541fe9df6","lessThan":"1a0c016a4831ea29be09bbc8162d4a2a0690b4b8","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/ti/am65-cpsw-nuss.c"],"versions":[{"version":"5.18","status":"affected"},{"version":"0","lessThan":"5.18","status":"unaffected","versionType":"semver"},{"version":"6.0.9","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18","versionEndExcluding":"6.0.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/442fd1bfe599bc54d118775e9e1a4fe913e4b369"},{"url":"https://git.kernel.org/stable/c/1a0c016a4831ea29be09bbc8162d4a2a0690b4b8"}],"title":"net: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload","x_generator":{"engine":"bippy-1.2.0"}}}}