Description
In the Linux kernel, the following vulnerability has been resolved: counter: rz-mtu3-cnt: prevent counter from being toggled multiple times Runtime PM counter is incremented / decremented each time the sysfs enable file is written to. If user writes 0 to the sysfs enable file multiple times, runtime PM usage count underflows, generating the following message. rz-mtu3-counter rz-mtu3-counter.0: Runtime PM usage count underflow! At the same time, hardware registers end up being accessed with clocks off in rz_mtu3_terminate_counter() to disable an already disabled channel. If user writes 1 to the sysfs enable file multiple times, runtime PM usage count will be incremented each time, requiring the same number of 0 writes to get it back to 0. If user writes 0 to the sysfs enable file while PWM is in progress, PWM is stopped without counter being the owner of the underlying MTU3 channel. Check against the cached count_is_enabled value and exit if the user is trying to set the same enable value.
Product status
0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before 885aa739a07ab45e90dfa997205acec97979ce4e
0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before ced8b48420eddb1251f93c22dc23fa136490b3cd
0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before e07237df8538b0ae98dce112e4f6db093d767f80
0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before f5f6f06d7e6d262026578b59ba7426eb04acce5d
0be8907359df4c62319f5cb2c6981ff0d9ebf35a (git) before 67c3f99bed6f422ba343d2b70a2eeeccdfd91bef
6.4
Any version before 6.4
6.6.134 (semver)
6.12.81 (semver)
6.18.22 (semver)
6.19.12 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/885aa739a07ab45e90dfa997205acec97979ce4e
git.kernel.org/...c/ced8b48420eddb1251f93c22dc23fa136490b3cd
git.kernel.org/...c/e07237df8538b0ae98dce112e4f6db093d767f80
git.kernel.org/...c/f5f6f06d7e6d262026578b59ba7426eb04acce5d
git.kernel.org/...c/67c3f99bed6f422ba343d2b70a2eeeccdfd91bef