Home

Description

In the Linux kernel, the following vulnerability has been resolved: counter: rz-mtu3-cnt: prevent counter from being toggled multiple times Runtime PM counter is incremented / decremented each time the sysfs enable file is written to. If user writes 0 to the sysfs enable file multiple times, runtime PM usage count underflows, generating the following message. rz-mtu3-counter rz-mtu3-counter.0: Runtime PM usage count underflow! At the same time, hardware registers end up being accessed with clocks off in rz_mtu3_terminate_counter() to disable an already disabled channel. If user writes 1 to the sysfs enable file multiple times, runtime PM usage count will be incremented each time, requiring the same number of 0 writes to get it back to 0. If user writes 0 to the sysfs enable file while PWM is in progress, PWM is stopped without counter being the owner of the underlying MTU3 channel. Check against the cached count_is_enabled value and exit if the user is trying to set the same enable value.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before 885aa739a07ab45e90dfa997205acec97979ce4e
affected

0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before ced8b48420eddb1251f93c22dc23fa136490b3cd
affected

0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before e07237df8538b0ae98dce112e4f6db093d767f80
affected

0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before f5f6f06d7e6d262026578b59ba7426eb04acce5d
affected

0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before 67c3f99bed6f422ba343d2b70a2eeeccdfd91bef
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

6.6.134 (semver)
unaffected

6.12.81 (semver)
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/885aa739a07ab45e90dfa997205acec97979ce4e

git.kernel.org/...c/ced8b48420eddb1251f93c22dc23fa136490b3cd

git.kernel.org/...c/e07237df8538b0ae98dce112e4f6db093d767f80

git.kernel.org/...c/f5f6f06d7e6d262026578b59ba7426eb04acce5d

git.kernel.org/...c/67c3f99bed6f422ba343d2b70a2eeeccdfd91bef

cve.org (CVE-2026-31741)

nvd.nist.gov (CVE-2026-31741)

Download JSON