CVE-2024-47698

In the Linux kernel, the following vulnerability has been resolved: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error Ensure index in rtl2832_pid_filter does not exceed 31 to prevent out-of-bounds access. dev->filters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access. Change the boundary check from index > 32 to index >= 32 to resolve this issue. [hverkuil: added fixes tag, rtl2830_pid_filter -> rtl2832_pid_filter in logmsg]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/49b33c38d202d3327dcfd058e27f541dcc308b92 -
  • () https://git.kernel.org/stable/c/7065c05c6d58b9b9a98127aa14e9a5ec68173918 -

23 Oct 2024, 20:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: media: dvb-frontends/rtl2832: corrige un error de escritura fuera de los límites Asegúrate de que el índice en rtl2832_pid_filter no supere 31 para evitar el acceso fuera de los límites. dev->filters es un valor de 32 bits, por lo que las funciones set_bit y clear_bit solo deben funcionar en índices de 0 a 31. Si el índice es 32, intentará acceder a un bit 33 inexistente, lo que provocará un acceso fuera de los límites. Cambia la comprobación de límites de índice > 32 a índice >= 32 para resolver este problema. [hverkuil: se agregó la etiqueta de correcciones, rtl2830_pid_filter -> rtl2832_pid_filter en logmsg]
References () https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a - () https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a - Patch
References () https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835 - () https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835 - Patch
References () https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 - () https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 - Patch
References () https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d - () https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d - Patch
References () https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1 - () https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1 - Patch
References () https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71 - () https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71 - Patch
References () https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60 - () https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60 - Patch
CWE CWE-787

21 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 12:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47698

Mitre link : CVE-2024-47698

CVE.ORG link : CVE-2024-47698


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write