CVE-2026-31741 (GCVE-0-2026-31741)
Vulnerability from cvelistv5 – Published: 2026-05-01 14:14 – Updated: 2026-05-01 14:14
VLAI?
Title
counter: rz-mtu3-cnt: prevent counter from being toggled multiple times
Summary
In the Linux kernel, the following vulnerability has been resolved:
counter: rz-mtu3-cnt: prevent counter from being toggled multiple times
Runtime PM counter is incremented / decremented each time the sysfs
enable file is written to.
If user writes 0 to the sysfs enable file multiple times, runtime PM
usage count underflows, generating the following message.
rz-mtu3-counter rz-mtu3-counter.0: Runtime PM usage count underflow!
At the same time, hardware registers end up being accessed with clocks
off in rz_mtu3_terminate_counter() to disable an already disabled
channel.
If user writes 1 to the sysfs enable file multiple times, runtime PM
usage count will be incremented each time, requiring the same number of
0 writes to get it back to 0.
If user writes 0 to the sysfs enable file while PWM is in progress, PWM
is stopped without counter being the owner of the underlying MTU3
channel.
Check against the cached count_is_enabled value and exit if the user
is trying to set the same enable value.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
0be8907359df4c62319f5cb2c6981ff0d9ebf35a , < 885aa739a07ab45e90dfa997205acec97979ce4e
(git)
Affected: 0be8907359df4c62319f5cb2c6981ff0d9ebf35a , < ced8b48420eddb1251f93c22dc23fa136490b3cd (git) Affected: 0be8907359df4c62319f5cb2c6981ff0d9ebf35a , < e07237df8538b0ae98dce112e4f6db093d767f80 (git) Affected: 0be8907359df4c62319f5cb2c6981ff0d9ebf35a , < f5f6f06d7e6d262026578b59ba7426eb04acce5d (git) Affected: 0be8907359df4c62319f5cb2c6981ff0d9ebf35a , < 67c3f99bed6f422ba343d2b70a2eeeccdfd91bef (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/counter/rz-mtu3-cnt.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "885aa739a07ab45e90dfa997205acec97979ce4e",
"status": "affected",
"version": "0be8907359df4c62319f5cb2c6981ff0d9ebf35a",
"versionType": "git"
},
{
"lessThan": "ced8b48420eddb1251f93c22dc23fa136490b3cd",
"status": "affected",
"version": "0be8907359df4c62319f5cb2c6981ff0d9ebf35a",
"versionType": "git"
},
{
"lessThan": "e07237df8538b0ae98dce112e4f6db093d767f80",
"status": "affected",
"version": "0be8907359df4c62319f5cb2c6981ff0d9ebf35a",
"versionType": "git"
},
{
"lessThan": "f5f6f06d7e6d262026578b59ba7426eb04acce5d",
"status": "affected",
"version": "0be8907359df4c62319f5cb2c6981ff0d9ebf35a",
"versionType": "git"
},
{
"lessThan": "67c3f99bed6f422ba343d2b70a2eeeccdfd91bef",
"status": "affected",
"version": "0be8907359df4c62319f5cb2c6981ff0d9ebf35a",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/counter/rz-mtu3-cnt.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.4"
},
{
"lessThan": "6.4",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.134",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.81",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.22",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.12",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.134",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.81",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.22",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.12",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncounter: rz-mtu3-cnt: prevent counter from being toggled multiple times\n\nRuntime PM counter is incremented / decremented each time the sysfs\nenable file is written to.\n\nIf user writes 0 to the sysfs enable file multiple times, runtime PM\nusage count underflows, generating the following message.\n\nrz-mtu3-counter rz-mtu3-counter.0: Runtime PM usage count underflow!\n\nAt the same time, hardware registers end up being accessed with clocks\noff in rz_mtu3_terminate_counter() to disable an already disabled\nchannel.\n\nIf user writes 1 to the sysfs enable file multiple times, runtime PM\nusage count will be incremented each time, requiring the same number of\n0 writes to get it back to 0.\n\nIf user writes 0 to the sysfs enable file while PWM is in progress, PWM\nis stopped without counter being the owner of the underlying MTU3\nchannel.\n\nCheck against the cached count_is_enabled value and exit if the user\nis trying to set the same enable value."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-01T14:14:36.845Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/885aa739a07ab45e90dfa997205acec97979ce4e"
},
{
"url": "https://git.kernel.org/stable/c/ced8b48420eddb1251f93c22dc23fa136490b3cd"
},
{
"url": "https://git.kernel.org/stable/c/e07237df8538b0ae98dce112e4f6db093d767f80"
},
{
"url": "https://git.kernel.org/stable/c/f5f6f06d7e6d262026578b59ba7426eb04acce5d"
},
{
"url": "https://git.kernel.org/stable/c/67c3f99bed6f422ba343d2b70a2eeeccdfd91bef"
}
],
"title": "counter: rz-mtu3-cnt: prevent counter from being toggled multiple times",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-31741",
"datePublished": "2026-05-01T14:14:36.845Z",
"dateReserved": "2026-03-09T15:48:24.138Z",
"dateUpdated": "2026-05-01T14:14:36.845Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-31741",
"date": "2026-05-05",
"epss": "0.00018",
"percentile": "0.04829"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-31741\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-01T15:16:36.820\",\"lastModified\":\"2026-05-01T15:24:14.893\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncounter: rz-mtu3-cnt: prevent counter from being toggled multiple times\\n\\nRuntime PM counter is incremented / decremented each time the sysfs\\nenable file is written to.\\n\\nIf user writes 0 to the sysfs enable file multiple times, runtime PM\\nusage count underflows, generating the following message.\\n\\nrz-mtu3-counter rz-mtu3-counter.0: Runtime PM usage count underflow!\\n\\nAt the same time, hardware registers end up being accessed with clocks\\noff in rz_mtu3_terminate_counter() to disable an already disabled\\nchannel.\\n\\nIf user writes 1 to the sysfs enable file multiple times, runtime PM\\nusage count will be incremented each time, requiring the same number of\\n0 writes to get it back to 0.\\n\\nIf user writes 0 to the sysfs enable file while PWM is in progress, PWM\\nis stopped without counter being the owner of the underlying MTU3\\nchannel.\\n\\nCheck against the cached count_is_enabled value and exit if the user\\nis trying to set the same enable value.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/67c3f99bed6f422ba343d2b70a2eeeccdfd91bef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/885aa739a07ab45e90dfa997205acec97979ce4e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ced8b48420eddb1251f93c22dc23fa136490b3cd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e07237df8538b0ae98dce112e4f6db093d767f80\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f5f6f06d7e6d262026578b59ba7426eb04acce5d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…