In the Linux kernel, the following vulnerability has been resolved:
regulator: da9211: Use irq handler when ready
If the system does not come from reset (like when it is kexec()), the
regulator might have an IRQ waiting for us.
If we enable the IRQ handler before its structures are ready, we crash.
This patch fixes:
[ 1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078
[ 1.316096] Call trace:
[ 1.316101] blocking_notifier_call_chain+0x20/0xa8
[ 1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests
[ 1.327823] regulator_notifier_call_chain+0x1c/0x2c
[ 1.327825] da9211_irq_handler+0x68/0xf8
[ 1.327829] irq_thread+0x11c/0x234
[ 1.327833] kthread+0x13c/0x154
References
Configurations
Configuration 1 (hide)
|
History
06 Sep 2024, 15:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb - Patch | |
References | () https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91 - Patch | |
References | () https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01 - Patch | |
References | () https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53 - Patch | |
References | () https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5 - Patch | |
References | () https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae - Patch | |
References | () https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Aug 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-21 07:15
Updated : 2024-09-06 15:39
NVD link : CVE-2022-48891
Mitre link : CVE-2022-48891
CVE.ORG link : CVE-2022-48891
JSON object : View
Products Affected
linux
- linux_kernel
CWE