๐Ÿ” CVE Alert

CVE-2024-56723

MEDIUM 5.5

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ). Rework the driver to respect IRQ domain when creating each MFD device separately, as the domain is not the same for all of them.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
57129044f5044dcd73c22d91491906104bd331fd < 6ea17c03edc7ed0aabb1431eb26e2f94849af68a 57129044f5044dcd73c22d91491906104bd331fd < 61d590d7076b50b6ebdea1f3b83bb041c01fc482 57129044f5044dcd73c22d91491906104bd331fd < bb6642d4b3136359b5b620049f76515876e6127e 57129044f5044dcd73c22d91491906104bd331fd < 7ba45b8bc62e64da524d45532107ae93eb33c93c 57129044f5044dcd73c22d91491906104bd331fd < d4cc78bd6a25accb7ae2ac9fc445d1e1deda4a62 57129044f5044dcd73c22d91491906104bd331fd < 897713c9d24f6ec394585abfcf259a6e5cad22c8 57129044f5044dcd73c22d91491906104bd331fd < b3d45c19bcffb9a9a821df759f60be39d88c19f4 57129044f5044dcd73c22d91491906104bd331fd < 0350d783ab888cb1cb48ced36cc28b372723f1a4
Linux / Linux
4.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6ea17c03edc7ed0aabb1431eb26e2f94849af68a git.kernel.org: https://git.kernel.org/stable/c/61d590d7076b50b6ebdea1f3b83bb041c01fc482 git.kernel.org: https://git.kernel.org/stable/c/bb6642d4b3136359b5b620049f76515876e6127e git.kernel.org: https://git.kernel.org/stable/c/7ba45b8bc62e64da524d45532107ae93eb33c93c git.kernel.org: https://git.kernel.org/stable/c/d4cc78bd6a25accb7ae2ac9fc445d1e1deda4a62 git.kernel.org: https://git.kernel.org/stable/c/897713c9d24f6ec394585abfcf259a6e5cad22c8 git.kernel.org: https://git.kernel.org/stable/c/b3d45c19bcffb9a9a821df759f60be39d88c19f4 git.kernel.org: https://git.kernel.org/stable/c/0350d783ab888cb1cb48ced36cc28b372723f1a4 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html