{"id":"CVE-2024-42092","summary":"gpio: davinci: Validate the obtained number of IRQs","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: davinci: Validate the obtained number of IRQs\n\nValue of pdata-\u003egpio_unbanked is taken from Device Tree. In case of broken\nDT due to any error this value can be any. Without this value validation\nthere can be out of chips-\u003eirqs array boundaries access in\ndavinci_gpio_probe().\n\nValidate the obtained nirq value so that it won't exceed the maximum\nnumber of IRQs per bank.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-04-02T12:17:47.425808Z","published":"2024-07-29T17:35:01.209Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42092.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2d83492259ad746b655f196cd5d1be4b3d0a3782"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70b48899f3f23f98a52c5b1060aefbdc7ba7957b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89d7008af4945808677662a630643b5ea89c6e8d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8d78984fdc105bc1a38b73e98d32b1bc4222684"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c542e51306d5f1eba3af84daa005826223382470"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd75721984337c38a12aeca33ba301d31ca4b3fd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e44a83bf15c4db053ac6dfe96a23af184c9136d9"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42092.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42092"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"eb3744a2dd01cb07ce9f556d56d6fe451f0c313a"},{"fixed":"a8d78984fdc105bc1a38b73e98d32b1bc4222684"},{"fixed":"cd75721984337c38a12aeca33ba301d31ca4b3fd"},{"fixed":"e44a83bf15c4db053ac6dfe96a23af184c9136d9"},{"fixed":"70b48899f3f23f98a52c5b1060aefbdc7ba7957b"},{"fixed":"89d7008af4945808677662a630643b5ea89c6e8d"},{"fixed":"2d83492259ad746b655f196cd5d1be4b3d0a3782"},{"fixed":"c542e51306d5f1eba3af84daa005826223382470"},{"fixed":"7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42092.json"}}],"schema_version":"1.7.5"}