CVE-2024-44931

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/08/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpio: prevent potential speculation leaks in gpio_device_get_desc()<br /> <br /> Userspace may trigger a speculative read of an address outside the gpio<br /> descriptor array.<br /> Users can do that by calling gpio_ioctl() with an offset out of range.<br /> Offset is copied from user and then used as an array index to get<br /> the gpio descriptor without sanitization in gpio_device_get_desc().<br /> <br /> This change ensures that the offset is sanitized by using<br /> array_index_nospec() to mitigate any possibility of speculative<br /> information leaks.<br /> <br /> This bug was discovered and resolved using Coverity Static Analysis<br /> Security Testing (SAST) by Synopsys, Inc.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.46 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.5 (excluding)