{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-35824","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-17T12:19:12.346Z","datePublished":"2024-05-17T13:27:25.357Z","dateUpdated":"2025-05-04T09:06:12.860Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:06:12.860Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume\n\nWhen not configured for wakeup lis3lv02d_i2c_suspend() will call\nlis3lv02d_poweroff() even if the device has already been turned off\nby the runtime-suspend handler and if configured for wakeup and\nthe device is runtime-suspended at this point then it is not turned\nback on to serve as a wakeup source.\n\nBefore commit b1b9f7a49440 (\"misc: lis3lv02d_i2c: Add missing setting\nof the reg_ctrl callback\"), lis3lv02d_poweroff() failed to disable\nthe regulators which as a side effect made calling poweroff() twice ok.\n\nNow that poweroff() correctly disables the regulators, doing this twice\ntriggers a WARN() in the regulator core:\n\nunbalanced disables for regulator-dummy\nWARNING: CPU: 1 PID: 92 at drivers/regulator/core.c:2999 _regulator_disable\n...\n\nFix lis3lv02d_i2c_suspend() to not call poweroff() a second time if\nalready runtime-suspended and add a poweron() call when necessary to\nmake wakeup work.\n\nlis3lv02d_i2c_resume() has similar issues, with an added weirness that\nit always powers on the device if it is runtime suspended, after which\nthe first runtime-resume will call poweron() again, causing the enabled\ncount for the regulator to increase by 1 every suspend/resume. These\nunbalanced regulator_enable() calls cause the regulator to never\nbe turned off and trigger the following WARN() on driver unbind:\n\nWARNING: CPU: 1 PID: 1724 at drivers/regulator/core.c:2396 _regulator_put\n\nFix this by making lis3lv02d_i2c_resume() mirror the new suspend()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/lis3lv02d/lis3lv02d_i2c.c"],"versions":[{"version":"2c1164ad927e62f122b151493bb183bc11dab8f8","lessThan":"4154e767354140db7804207117e7238fb337b0e7","status":"affected","versionType":"git"},{"version":"1229ce1c4acd36f5af97c996420defc43daca635","lessThan":"997ca415384612c8df76d99d9a768e0b3f42b325","status":"affected","versionType":"git"},{"version":"755182e1e8667272a082506a2a20b4cdd78ab4c2","lessThan":"f6df761182fc953907b18aba5049fc2a044ecb45","status":"affected","versionType":"git"},{"version":"b1b9f7a494400c0c39f8cd83de3aaa6111c55087","lessThan":"ac3e0384073b2408d6cb0d972fee9fcc3776053d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/lis3lv02d/lis3lv02d_i2c.c"],"versions":[{"version":"6.1.77","lessThan":"6.1.84","status":"affected","versionType":"semver"},{"version":"6.6.16","lessThan":"6.6.24","status":"affected","versionType":"semver"},{"version":"6.7.4","lessThan":"6.7.12","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.77","versionEndExcluding":"6.1.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.16","versionEndExcluding":"6.6.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.4","versionEndExcluding":"6.7.12"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7"},{"url":"https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325"},{"url":"https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45"},{"url":"https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d"}],"title":"misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-31T18:40:44.476426Z","id":"CVE-2024-35824","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-29T19:26:50.030Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:21:47.618Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d","tags":["x_transferred"]}]}]}}