mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
18 lines
1.4 KiB
Markdown
18 lines
1.4 KiB
Markdown
|
|
### [CVE-2024-56671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56671)
|
||
|
|

|
||
|
|

|
||
|
|

|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
In the Linux kernel, the following vulnerability has been resolved:gpio: graniterapids: Fix vGPIO driver crashMove setting irq_chip.name from probe() function to the initializationof "irq_chip" struct in order to fix vGPIO driver crash during bootup.Crash was caused by unauthorized modification of irq_chip.name fieldwhere irq_chip struct was initialized as const.This behavior is a consequence of suboptimal implementation ofgpio_irq_chip_set_chip(), which should be changed to avoidcasting away const qualifier.Crash log:BUG: unable to handle page fault for address: ffffffffc0ba81c0/#PF: supervisor write access in kernel mode/#PF: error_code(0x0003) - permissions violationCPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024RIP: 0010:gnr_gpio_probe+0x171/0x220 [gpio_graniterapids]
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
No PoCs from references.
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/cku-heise/euvd-api-doc
|
||
|
|
|