In the Linux kernel, the following vulnerability has been resolved:
media: intel/ipu6: do not handle interrupts when device is disabled
Some IPU6 devices have shared interrupts. We need to handle properly
case when interrupt is triggered from other device on shared irq line
and IPU6 itself disabled. In such case we get 0xffffffff from
ISR_STATUS register and handle all irq's cases, for what we are not
not prepared and usually hang the whole system.
To avoid the issue use pm_runtime_get_if_active() to check if
the device is enabled and prevent suspending it when we handle irq
until the end of irq. Additionally use synchronize_irq() in suspend
References
Configurations
Configuration 1 (hide)
|
History
06 Oct 2025, 17:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/1429826883bb18847092b2e04c6598ef34bae1d4 - Patch | |
References | () https://git.kernel.org/stable/c/57241487a3648515c9aa6fa89e31f2414eccfdbc - Patch | |
References | () https://git.kernel.org/stable/c/ed4524c87249edc3104f6bb28ab11325bed3d536 - Patch | |
Summary |
|
|
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo |
28 Dec 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-28 10:15
Updated : 2025-10-06 17:43
NVD link : CVE-2024-56680
Mitre link : CVE-2024-56680
CVE.ORG link : CVE-2024-56680
JSON object : View
Products Affected
linux
- linux_kernel
CWE