CVE-2024-56671

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56671
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56671.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-56671
Downstream
Related
Published
2024-12-27T15:15:26Z
Modified
2025-08-09T19:01:27Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

gpio: graniterapids: Fix vGPIO driver crash

Move setting irqchip.name from probe() function to the initialization of "irqchip" struct in order to fix vGPIO driver crash during bootup.

Crash was caused by unauthorized modification of irqchip.name field where irqchip struct was initialized as const.

This behavior is a consequence of suboptimal implementation of gpioirqchipsetchip(), which should be changed to avoid casting away const qualifier.

Crash log: BUG: unable to handle page fault for address: ffffffffc0ba81c0 /#PF: supervisor write access in kernel mode /#PF: errorcode(0x0003) - permissions violation CPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1 Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024 RIP: 0010:gnrgpioprobe+0x171/0x220 [gpiograniterapids]

References

Affected packages