Impact
The loongson‑64bit GPIO driver contains a faulty NULL check performed after allocating memory. The code compares the wrong structure field—chip->parent—instead of chip->irq.parents. If chip->irq.parents is NULL, this mistake can lead to a NULL pointer dereference in the kernel, which, as a typical outcome of CWE‑476, would likely cause a kernel panic and a loss of service. The official description does not explicitly state that a crash will occur, but the nature of the flaw and the identified CWE allow us to infer that the vulnerability could lead to a denial‑of‑service event.
Affected Systems
The vulnerability is present in the Linux kernel loongson‑64bit driver for the 6.19 release candidate series, specifically rc1 through rc8. Systems that run these kernel versions on Loongson‑64bit architectures and have the driver compiled or loaded are potentially affected.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is not explicitly detailed; however, because the defect appears during driver initialization, it most likely requires local access sufficient to load or recompile the module. Root or privileged users who can load the driver would therefore enable an attacker to trigger the crash, while remote exploitation appears unlikely from the information provided.
OpenCVE Enrichment