CVE-2024-42092

In the Linux kernel, the following vulnerability has been resolved: gpio: davinci: Validate the obtained number of IRQs Value of pdata->gpio_unbanked is taken from Device Tree. In case of broken DT due to any error this value can be any. Without this value validation there can be out of chips->irqs array boundaries access in davinci_gpio_probe(). Validate the obtained nirq value so that it won't exceed the maximum number of IRQs per bank. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*

History

26 Sep 2025, 14:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782 - () https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782 - Patch
References () https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b - () https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b - Patch
References () https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164 - () https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164 - Patch
References () https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d - () https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d - Patch
References () https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684 - () https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684 - Patch
References () https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470 - () https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470 - Patch
References () https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd - () https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd - Patch
References () https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9 - () https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9 - Patch
CWE CWE-129
First Time Linux
Linux linux Kernel

Information

Published : 2024-07-29 18:15

Updated : 2025-09-26 14:49


NVD link : CVE-2024-42092

Mitre link : CVE-2024-42092

CVE.ORG link : CVE-2024-42092


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index