๐Ÿ” CVE Alert

CVE-2024-56724

MEDIUM 5.5

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ). Rework the driver to respect IRQ domain when creating each MFD device separately, as the domain is not the same for all of them.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
957ae5098185e763b5c06be6c3b4b6e98c048712 < b7c7c400de85d915e0da7c2c363553a801c47349 957ae5098185e763b5c06be6c3b4b6e98c048712 < c472b55cc0bc3df805db6a14f50a084884cf18ee 957ae5098185e763b5c06be6c3b4b6e98c048712 < da498e02c92e6d82df8001438dd583b90c570815 957ae5098185e763b5c06be6c3b4b6e98c048712 < 56acf415772ee7e10e448b371f52b249aa2d0f7b 957ae5098185e763b5c06be6c3b4b6e98c048712 < 1b734ad0e33648c3988c6a37c2ac16c2d63eda06 957ae5098185e763b5c06be6c3b4b6e98c048712 < 2310f5336f32eac9ada2d59b965d578efe25c4bf 957ae5098185e763b5c06be6c3b4b6e98c048712 < 5bc6d0da4a32fe34a9960de577e0b7de3454de0c 957ae5098185e763b5c06be6c3b4b6e98c048712 < 9b79d59e6b2b515eb9a22bc469ef7b8f0904fc73
Linux / Linux
4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b7c7c400de85d915e0da7c2c363553a801c47349 git.kernel.org: https://git.kernel.org/stable/c/c472b55cc0bc3df805db6a14f50a084884cf18ee git.kernel.org: https://git.kernel.org/stable/c/da498e02c92e6d82df8001438dd583b90c570815 git.kernel.org: https://git.kernel.org/stable/c/56acf415772ee7e10e448b371f52b249aa2d0f7b git.kernel.org: https://git.kernel.org/stable/c/1b734ad0e33648c3988c6a37c2ac16c2d63eda06 git.kernel.org: https://git.kernel.org/stable/c/2310f5336f32eac9ada2d59b965d578efe25c4bf git.kernel.org: https://git.kernel.org/stable/c/5bc6d0da4a32fe34a9960de577e0b7de3454de0c git.kernel.org: https://git.kernel.org/stable/c/9b79d59e6b2b515eb9a22bc469ef7b8f0904fc73 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html