CVE-2022-48891

In the Linux kernel, the following vulnerability has been resolved: regulator: da9211: Use irq handler when ready If the system does not come from reset (like when it is kexec()), the regulator might have an IRQ waiting for us. If we enable the IRQ handler before its structures are ready, we crash. This patch fixes: [ 1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078 [ 1.316096] Call trace: [ 1.316101] blocking_notifier_call_chain+0x20/0xa8 [ 1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests [ 1.327823] regulator_notifier_call_chain+0x1c/0x2c [ 1.327825] da9211_irq_handler+0x68/0xf8 [ 1.327829] irq_thread+0x11c/0x234 [ 1.327833] kthread+0x13c/0x154
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*

History

06 Sep 2024, 15:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: regulator: da9211: Usar irq handler cuando esté listo Si el sistema no viene del reset (como cuando es kexec()), es posible que el regulador tenga una IRQ esperándonos. Si habilitamos el controlador IRQ antes de que sus estructuras estén listas, fallamos. Este parche corrige: [1.141839] No se puede manejar la lectura del kernel desde una memoria ilegible en la dirección virtual 0000000000000078 [1.316096] Rastreo de llamadas: [1.316101] blocking_notifier_call_chain+0x20/0xa8 [ 1.322757] cpu cpu0: suministros ficticios no permitidos para solicitudes exclusivas [ 1.327 823] regulador_notificador_call_chain +0x1c/0x2c [ 1.327825] da9211_irq_handler+0x68/0xf8 [ 1.327829] irq_thread+0x11c/0x234 [ 1.327833] kthread+0x13c/0x154
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb - () https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb - Patch
References () https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91 - () https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91 - Patch
References () https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01 - () https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01 - Patch
References () https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53 - () https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53 - Patch
References () https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5 - () https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5 - Patch
References () https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae - () https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae - Patch
References () https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236 - () https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236 - Patch
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Aug 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-21 07:15

Updated : 2024-09-06 15:39


NVD link : CVE-2022-48891

Mitre link : CVE-2022-48891

CVE.ORG link : CVE-2022-48891


JSON object : View

Products Affected

linux

  • linux_kernel