CVE-2024-44931

Source
https://cve.org/CVERecord?id=CVE-2024-44931
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44931.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-44931
Downstream
Related
Published
2024-08-26T10:11:21.425Z
Modified
2026-03-20T12:37:47.701779Z
Summary
gpio: prevent potential speculation leaks in gpio_device_get_desc()
Details

In the Linux kernel, the following vulnerability has been resolved:

gpio: prevent potential speculation leaks in gpiodeviceget_desc()

Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpioioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpiodevicegetdesc().

This change ensures that the offset is sanitized by using arrayindexnospec() to mitigate any possibility of speculative information leaks.

This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44931.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
521a2ad6f862a28e2e43cb3e254a26bf0f9452e9
Fixed
18504710442671b02d00e6db9804a0ad26c5a479
Fixed
9ae2d8e75b741dbcb0da374753f972410e83b5f3
Fixed
9d682e89c44bd5819b01f3fbb45a8e3681a4b6d0
Fixed
c65ab97efcd438cb4e9f299400f2ea55251f3a67
Fixed
672c19165fc96dfad531a5458e0b3cdab414aae4
Fixed
1b955f786a4bcde8c0ccb2b7d519def2acb6f3cc
Fixed
d776c0486b03a5c4afca65b8ff44573592bf93bb
Fixed
d795848ecce24a75dfd46481aee066ae6fe39775

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44931.json"