CVE-2024-44931

Updated: 2024-11-08 19:01:16.182576

Description:

In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-16 12:23:30
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-16 12:23:30
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-16 12:23:30
Oracle Linux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-12-03 12:09:31
Total: 13