๐Ÿ” CVE Alert

CVE-2024-47698

UNKNOWN 0.0

drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error Ensure index in rtl2832_pid_filter does not exceed 31 to prevent out-of-bounds access. dev->filters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access. Change the boundary check from index > 32 to index >= 32 to resolve this issue. [hverkuil: added fixes tag, rtl2830_pid_filter -> rtl2832_pid_filter in logmsg]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4b01e01a81b6629878344430531ced347cc2ed5b < 7065c05c6d58b9b9a98127aa14e9a5ec68173918 4b01e01a81b6629878344430531ced347cc2ed5b < 49b33c38d202d3327dcfd058e27f541dcc308b92 4b01e01a81b6629878344430531ced347cc2ed5b < 6ae3b9aee42616ee93c4585174f40c767828006d 4b01e01a81b6629878344430531ced347cc2ed5b < a879b6cdd48134a3d58949ea4f075c75fa2d7d71 4b01e01a81b6629878344430531ced347cc2ed5b < 15bea004e939d938a6771dfcf2a26cc899ffd20a 4b01e01a81b6629878344430531ced347cc2ed5b < 527ab3eb3b0b4a6ee00e183c1de6a730239e2835 4b01e01a81b6629878344430531ced347cc2ed5b < 66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 4b01e01a81b6629878344430531ced347cc2ed5b < bedd42e07988dbdd124b23e758ffef7a681b9c60 4b01e01a81b6629878344430531ced347cc2ed5b < 8ae06f360cfaca2b88b98ca89144548b3186aab1
Linux / Linux
4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7065c05c6d58b9b9a98127aa14e9a5ec68173918 git.kernel.org: https://git.kernel.org/stable/c/49b33c38d202d3327dcfd058e27f541dcc308b92 git.kernel.org: https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d git.kernel.org: https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71 git.kernel.org: https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a git.kernel.org: https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835 git.kernel.org: https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 git.kernel.org: https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60 git.kernel.org: https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html