We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56723

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices



Description

In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ). Rework the driver to respect IRQ domain when creating each MFD device separately, as the domain is not the same for all of them.

Reserved 2024-12-27 | Published 2024-12-29 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

57129044f5044dcd73c22d91491906104bd331fd before 6ea17c03edc7ed0aabb1431eb26e2f94849af68a
affected

57129044f5044dcd73c22d91491906104bd331fd before 61d590d7076b50b6ebdea1f3b83bb041c01fc482
affected

57129044f5044dcd73c22d91491906104bd331fd before bb6642d4b3136359b5b620049f76515876e6127e
affected

57129044f5044dcd73c22d91491906104bd331fd before 7ba45b8bc62e64da524d45532107ae93eb33c93c
affected

57129044f5044dcd73c22d91491906104bd331fd before d4cc78bd6a25accb7ae2ac9fc445d1e1deda4a62
affected

57129044f5044dcd73c22d91491906104bd331fd before 897713c9d24f6ec394585abfcf259a6e5cad22c8
affected

57129044f5044dcd73c22d91491906104bd331fd before b3d45c19bcffb9a9a821df759f60be39d88c19f4
affected

57129044f5044dcd73c22d91491906104bd331fd before 0350d783ab888cb1cb48ced36cc28b372723f1a4
affected

Default status
affected

4.13
affected

Any version before 4.13
unaffected

5.4.287
unaffected

5.10.231
unaffected

5.15.174
unaffected

6.1.120
unaffected

6.6.64
unaffected

6.11.11
unaffected

6.12.2
unaffected

6.13
unaffected

References

git.kernel.org/...c/6ea17c03edc7ed0aabb1431eb26e2f94849af68a

git.kernel.org/...c/61d590d7076b50b6ebdea1f3b83bb041c01fc482

git.kernel.org/...c/bb6642d4b3136359b5b620049f76515876e6127e

git.kernel.org/...c/7ba45b8bc62e64da524d45532107ae93eb33c93c

git.kernel.org/...c/d4cc78bd6a25accb7ae2ac9fc445d1e1deda4a62

git.kernel.org/...c/897713c9d24f6ec394585abfcf259a6e5cad22c8

git.kernel.org/...c/b3d45c19bcffb9a9a821df759f60be39d88c19f4

git.kernel.org/...c/0350d783ab888cb1cb48ced36cc28b372723f1a4

cve.org (CVE-2024-56723)

nvd.nist.gov (CVE-2024-56723)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56723

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.