CVE-2024-47697

In the Linux kernel, the following vulnerability has been resolved: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error Ensure index in rtl2830_pid_filter does not exceed 31 to prevent out-of-bounds access. dev->filters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access. Change the boundary check from index > 32 to index >= 32 to resolve this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/883f794c6e498ae24680aead55c16f66b06cfc30 -
  • () https://git.kernel.org/stable/c/8ffbe7d07b8e76193b151107878ddc1ccc94deb5 -

23 Oct 2024, 20:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
References () https://git.kernel.org/stable/c/042b101d7bf70616c4967c286ffa6fcca65babfb - () https://git.kernel.org/stable/c/042b101d7bf70616c4967c286ffa6fcca65babfb - Patch
References () https://git.kernel.org/stable/c/3dba83d3c81de1368d15a39f22df7b53e306052f - () https://git.kernel.org/stable/c/3dba83d3c81de1368d15a39f22df7b53e306052f - Patch
References () https://git.kernel.org/stable/c/46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14 - () https://git.kernel.org/stable/c/46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14 - Patch
References () https://git.kernel.org/stable/c/58f31be7dfbc0c84a6497ad51924949cf64b86a2 - () https://git.kernel.org/stable/c/58f31be7dfbc0c84a6497ad51924949cf64b86a2 - Patch
References () https://git.kernel.org/stable/c/7fd6aae7e53b94f4035b1bfce28b8dfa0d0ae470 - () https://git.kernel.org/stable/c/7fd6aae7e53b94f4035b1bfce28b8dfa0d0ae470 - Patch
References () https://git.kernel.org/stable/c/86d920d2600c3a48efc2775c1666c1017eec6956 - () https://git.kernel.org/stable/c/86d920d2600c3a48efc2775c1666c1017eec6956 - Patch
References () https://git.kernel.org/stable/c/badbd736e6649c4e6d7b4ff7e2b9857acfa9ea94 - () https://git.kernel.org/stable/c/badbd736e6649c4e6d7b4ff7e2b9857acfa9ea94 - Patch
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: media: dvb-frontends/rtl2830: corrige un error de escritura fuera de los límites Asegúrate de que el índice en rtl2830_pid_filter no supere 31 para evitar el acceso fuera de los límites. dev->filters es un valor de 32 bits, por lo que las funciones set_bit y clear_bit solo deben funcionar en índices de 0 a 31. Si el índice es 32, intentará acceder a un bit 33 inexistente, lo que provocará un acceso fuera de los límites. Cambia la comprobación de límites de índice > 32 a índice >= 32 para resolver este problema.

21 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 12:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47697

Mitre link : CVE-2024-47697

CVE.ORG link : CVE-2024-47697


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write