Количество 19
Количество 19
CVE-2024-44931
In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.
CVE-2024-44931
In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.
CVE-2024-44931
In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.
CVE-2024-44931
gpio: prevent potential speculation leaks in gpio_device_get_desc()
CVE-2024-44931
In the Linux kernel, the following vulnerability has been resolved: g ...
GHSA-cxw8-j5f9-53mh
In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.
BDU:2025-02927
Уязвимость функции gpiochip_get_desc() модуля drivers/gpio/gpiolib.c драйвера GPIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
ROS-20250310-01
Множественные уязвимости kernel-lt
SUSE-SU-2025:0034-1
Security update for the Linux Kernel
SUSE-SU-2024:4100-1
Security update for the Linux Kernel
ELSA-2024-12884
ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2024:3983-1
Security update for the Linux Kernel
SUSE-SU-2024:3985-1
Security update for the Linux Kernel
ELSA-2024-12887
ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-6966
ELSA-2025-6966: kernel security update (MODERATE)
SUSE-SU-2024:3195-1
Security update for the Linux Kernel
SUSE-SU-2024:3383-1
Security update for the Linux Kernel
SUSE-SU-2024:3194-1
Security update for the Linux Kernel
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-44931 In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-44931 In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-44931 In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-44931 gpio: prevent potential speculation leaks in gpio_device_get_desc() | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2024-44931 In the Linux kernel, the following vulnerability has been resolved: g ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-cxw8-j5f9-53mh In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc(). This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
BDU:2025-02927 Уязвимость функции gpiochip_get_desc() модуля drivers/gpio/gpiolib.c драйвера GPIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
ROS-20250310-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 8 месяцев назад | ||
SUSE-SU-2025:0034-1 Security update for the Linux Kernel | 10 месяцев назад | |||
SUSE-SU-2024:4100-1 Security update for the Linux Kernel | 12 месяцев назад | |||
ELSA-2024-12884 ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
SUSE-SU-2024:3983-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3985-1 Security update for the Linux Kernel | около 1 года назад | |||
ELSA-2024-12887 ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2025-6966 ELSA-2025-6966: kernel security update (MODERATE) | 6 месяцев назад | |||
SUSE-SU-2024:3195-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3383-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3194-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу