Out-of-bounds read in Linux kernel media dvb-frontends driver



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-47698
CWE-ID CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU98919

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-47698

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the rtl2832_pid_filter() function in drivers/media/dvb-frontends/rtl2832.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

CPE2.3
External links

http://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d
http://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71
http://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a
http://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835
http://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447
http://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60
http://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###