First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gpio: graniterapids: Fix vGPIO driver crash Move setting irq_chip.name from probe() function to the initialization of "irq_chip" struct in order to fix vGPIO driver crash during bootup. Crash was caused by unauthorized modification of irq_chip.name field where irq_chip struct was initialized as const. This behavior is a consequence of suboptimal implementation of gpio_irq_chip_set_chip(), which should be changed to avoid casting away const qualifier. Crash log: BUG: unable to handle page fault for address: ffffffffc0ba81c0 /#PF: supervisor write access in kernel mode /#PF: error_code(0x0003) - permissions violation CPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1 Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024 RIP: 0010:gnr_gpio_probe+0x171/0x220 [gpio_graniterapids]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=6.10<6.12.6 | |
Linux kernel | =6.13-rc1 | |
Linux kernel | =6.13-rc2 | |
Linux Kernel | >=6.10<6.12.6 | |
Linux Kernel | =6.13-rc1 | |
Linux Kernel | =6.13-rc2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56671 has been classified as a medium severity vulnerability due to the potential for system crashes.
CVE-2024-56671 affects Linux kernel versions from 6.10 up to 6.12.6 and specific release candidates 6.13-rc1 and 6.13-rc2.
To fix CVE-2024-56671, update the Linux kernel to a patched version beyond 6.12.6 or apply relevant security patches.
The crash in CVE-2024-56671 is caused by improper initialization of the irq_chip struct in the vGPIO driver.
There is no known workaround for CVE-2024-56671; updating to a secure kernel version is recommended.