๐Ÿ” CVE Alert

CVE-2024-44931

UNKNOWN 0.0

gpio: prevent potential speculation leaks in gpio_device_get_desc()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 26, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < 18504710442671b02d00e6db9804a0ad26c5a479 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < 9ae2d8e75b741dbcb0da374753f972410e83b5f3 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < 9d682e89c44bd5819b01f3fbb45a8e3681a4b6d0 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < c65ab97efcd438cb4e9f299400f2ea55251f3a67 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < 672c19165fc96dfad531a5458e0b3cdab414aae4 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < 1b955f786a4bcde8c0ccb2b7d519def2acb6f3cc 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < d776c0486b03a5c4afca65b8ff44573592bf93bb 521a2ad6f862a28e2e43cb3e254a26bf0f9452e9 < d795848ecce24a75dfd46481aee066ae6fe39775
Linux / Linux
4.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/18504710442671b02d00e6db9804a0ad26c5a479 git.kernel.org: https://git.kernel.org/stable/c/9ae2d8e75b741dbcb0da374753f972410e83b5f3 git.kernel.org: https://git.kernel.org/stable/c/9d682e89c44bd5819b01f3fbb45a8e3681a4b6d0 git.kernel.org: https://git.kernel.org/stable/c/c65ab97efcd438cb4e9f299400f2ea55251f3a67 git.kernel.org: https://git.kernel.org/stable/c/672c19165fc96dfad531a5458e0b3cdab414aae4 git.kernel.org: https://git.kernel.org/stable/c/1b955f786a4bcde8c0ccb2b7d519def2acb6f3cc git.kernel.org: https://git.kernel.org/stable/c/d776c0486b03a5c4afca65b8ff44573592bf93bb git.kernel.org: https://git.kernel.org/stable/c/d795848ecce24a75dfd46481aee066ae6fe39775 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html