Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-56625
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Dec, 2024 | 14:51
Updated At-03 Nov, 2025 | 20:51
Rejected At-
▼CVE Numbering Authority (CNA)
can: dev: can_set_termination(): allow sleeping GPIOs

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_set_termination(): allow sleeping GPIOs In commit 6e86a1543c37 ("can: dev: provide optional GPIO based termination support") GPIO based termination support was added. For no particular reason that patch uses gpiod_set_value() to set the GPIO. This leads to the following warning, if the systems uses a sleeping GPIO, i.e. behind an I2C port expander: | WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x50/0x6c | CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236c Replace gpiod_set_value() by gpiod_set_value_cansleep() to allow the use of sleeping GPIOs.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/can/dev/dev.c
Default Status
unaffected
Versions
Affected
  • From 6e86a1543c378f2e8837ad88f361b7bf606c80f7 before faa0a1975a6fbce30616775216606eb8d6388ea1 (git)
  • From 6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 46637a608fb1ee871a0ad8bf70d917d5d95ac251 (git)
  • From 6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 1ac442f25c19953d2f33b92549628b0aeac83db6 (git)
  • From 6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 3b0c5bb437d31a9864f633b85cbc42d2f6c51c96 (git)
  • From 6e86a1543c378f2e8837ad88f361b7bf606c80f7 before ee1dfbdd8b4b6de85e96ae2059dc9c1bdb6b49b5 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/can/dev/dev.c
Default Status
affected
Versions
Affected
  • 5.15
Unaffected
  • From 0 before 5.15 (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.66 through 6.6.* (semver)
  • From 6.12.5 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/faa0a1975a6fbce30616775216606eb8d6388ea1
N/A
https://git.kernel.org/stable/c/46637a608fb1ee871a0ad8bf70d917d5d95ac251
N/A
https://git.kernel.org/stable/c/1ac442f25c19953d2f33b92549628b0aeac83db6
N/A
https://git.kernel.org/stable/c/3b0c5bb437d31a9864f633b85cbc42d2f6c51c96
N/A
https://git.kernel.org/stable/c/ee1dfbdd8b4b6de85e96ae2059dc9c1bdb6b49b5
N/A
Hyperlink: https://git.kernel.org/stable/c/faa0a1975a6fbce30616775216606eb8d6388ea1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/46637a608fb1ee871a0ad8bf70d917d5d95ac251
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1ac442f25c19953d2f33b92549628b0aeac83db6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3b0c5bb437d31a9864f633b85cbc42d2f6c51c96
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ee1dfbdd8b4b6de85e96ae2059dc9c1bdb6b49b5
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Details not found