cve/2024/CVE-2024-56671.md
2025-09-29 16:08:36 +00:00

18 lines
1.4 KiB
Markdown

### [CVE-2024-56671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56671)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2%3C%20e631cab10c6b287a33c35953e6dbda1f7f89bc1f%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the Linux kernel, the following vulnerability has been resolved:gpio: graniterapids: Fix vGPIO driver crashMove setting irq_chip.name from probe() function to the initializationof "irq_chip" struct in order to fix vGPIO driver crash during bootup.Crash was caused by unauthorized modification of irq_chip.name fieldwhere irq_chip struct was initialized as const.This behavior is a consequence of suboptimal implementation ofgpio_irq_chip_set_chip(), which should be changed to avoidcasting away const qualifier.Crash log:BUG: unable to handle page fault for address: ffffffffc0ba81c0/#PF: supervisor write access in kernel mode/#PF: error_code(0x0003) - permissions violationCPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024RIP: 0010:gnr_gpio_probe+0x171/0x220 [gpio_graniterapids]
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/cku-heise/euvd-api-doc