CVE-2024-47698
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error Ensure index in rtl2832_pid_filter does not exceed 31 to prevent out-of-bounds access. dev->filters is a 32-bit value, so set_bit and clear_bit functions should only operate on indices from 0 to 31. If index is 32, it will attempt to access a non-existent 33rd bit, leading to out-of-bounds access. Change the boundary check from index > 32 to index >= 32 to resolve this issue. [hverkuil: added fixes tag, rtl2830_pid_filter -> rtl2832_pid_filter in logmsg]
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4b01e01a81b6629878344430531ced347cc2ed5b < 7065c05c6d58b9b9a98127aa14e9a5ec68173918 4b01e01a81b6629878344430531ced347cc2ed5b < 49b33c38d202d3327dcfd058e27f541dcc308b92 4b01e01a81b6629878344430531ced347cc2ed5b < 6ae3b9aee42616ee93c4585174f40c767828006d 4b01e01a81b6629878344430531ced347cc2ed5b < a879b6cdd48134a3d58949ea4f075c75fa2d7d71 4b01e01a81b6629878344430531ced347cc2ed5b < 15bea004e939d938a6771dfcf2a26cc899ffd20a 4b01e01a81b6629878344430531ced347cc2ed5b < 527ab3eb3b0b4a6ee00e183c1de6a730239e2835 4b01e01a81b6629878344430531ced347cc2ed5b < 66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 4b01e01a81b6629878344430531ced347cc2ed5b < bedd42e07988dbdd124b23e758ffef7a681b9c60 4b01e01a81b6629878344430531ced347cc2ed5b < 8ae06f360cfaca2b88b98ca89144548b3186aab1
Linux / Linux
4.0
References
git.kernel.org: https://git.kernel.org/stable/c/7065c05c6d58b9b9a98127aa14e9a5ec68173918 git.kernel.org: https://git.kernel.org/stable/c/49b33c38d202d3327dcfd058e27f541dcc308b92 git.kernel.org: https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d git.kernel.org: https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71 git.kernel.org: https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a git.kernel.org: https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835 git.kernel.org: https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447 git.kernel.org: https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60 git.kernel.org: https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html