Executive Summary

Informations
Name CVE-2024-56671 First vendor Publication 2024-12-27
Vendor Cve Last vendor Modification 2025-01-06

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

gpio: graniterapids: Fix vGPIO driver crash

Move setting irq_chip.name from probe() function to the initialization of "irq_chip" struct in order to fix vGPIO driver crash during bootup.

Crash was caused by unauthorized modification of irq_chip.name field where irq_chip struct was initialized as const.

This behavior is a consequence of suboptimal implementation of gpio_irq_chip_set_chip(), which should be changed to avoid casting away const qualifier.

Crash log: BUG: unable to handle page fault for address: ffffffffc0ba81c0 /#PF: supervisor write access in kernel mode /#PF: error_code(0x0003) - permissions violation CPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1 Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024 RIP: 0010:gnr_gpio_probe+0x171/0x220 [gpio_graniterapids]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56671

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3703

Sources (Detail)

https://git.kernel.org/stable/c/e631cab10c6b287a33c35953e6dbda1f7f89bc1f
https://git.kernel.org/stable/c/eb9640fd1ce666610b77f5997596e9570a36378f
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2025-07-15 02:41:16
  • Multiple Updates
2025-07-14 12:38:33
  • Multiple Updates
2025-06-26 02:38:30
  • Multiple Updates
2025-06-25 12:36:34
  • Multiple Updates
2025-06-24 02:43:08
  • Multiple Updates
2025-05-27 02:48:33
  • Multiple Updates
2025-03-29 03:44:27
  • Multiple Updates
2025-03-28 13:47:43
  • Multiple Updates
2025-03-28 03:22:16
  • Multiple Updates
2025-03-19 03:17:05
  • Multiple Updates
2025-03-18 03:30:04
  • Multiple Updates
2025-03-14 03:17:12
  • Multiple Updates
2025-03-06 14:13:44
  • Multiple Updates
2025-02-22 03:27:16
  • Multiple Updates
2025-01-08 00:20:53
  • Multiple Updates
2025-01-07 03:08:09
  • Multiple Updates
2025-01-07 00:20:36
  • Multiple Updates
2025-01-06 21:20:43
  • Multiple Updates
2024-12-27 21:20:27
  • First insertion