{"id":"CVE-2024-47697","summary":"drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\n\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent\nout-of-bounds access.\n\ndev-\u003efilters is a 32-bit value, so set_bit and clear_bit functions should\nonly operate on indices from 0 to 31. If index is 32, it will attempt to\naccess a non-existent 33rd bit, leading to out-of-bounds access.\nChange the boundary check from index \u003e 32 to index \u003e= 32 to resolve this\nissue.","modified":"2026-04-16T04:30:58.778785627Z","published":"2024-10-21T11:53:34.630Z","related":["SUSE-SU-2024:3984-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0034-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47697.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/042b101d7bf70616c4967c286ffa6fcca65babfb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3dba83d3c81de1368d15a39f22df7b53e306052f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14"},{"type":"WEB","url":"https://git.kernel.org/stable/c/58f31be7dfbc0c84a6497ad51924949cf64b86a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7fd6aae7e53b94f4035b1bfce28b8dfa0d0ae470"},{"type":"WEB","url":"https://git.kernel.org/stable/c/86d920d2600c3a48efc2775c1666c1017eec6956"},{"type":"WEB","url":"https://git.kernel.org/stable/c/883f794c6e498ae24680aead55c16f66b06cfc30"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ffbe7d07b8e76193b151107878ddc1ccc94deb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/badbd736e6649c4e6d7b4ff7e2b9857acfa9ea94"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47697.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47697"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"df70ddad81b47c57bcccffc805fbd75f2f1b2dc6"},{"fixed":"8ffbe7d07b8e76193b151107878ddc1ccc94deb5"},{"fixed":"883f794c6e498ae24680aead55c16f66b06cfc30"},{"fixed":"badbd736e6649c4e6d7b4ff7e2b9857acfa9ea94"},{"fixed":"86d920d2600c3a48efc2775c1666c1017eec6956"},{"fixed":"3dba83d3c81de1368d15a39f22df7b53e306052f"},{"fixed":"58f31be7dfbc0c84a6497ad51924949cf64b86a2"},{"fixed":"7fd6aae7e53b94f4035b1bfce28b8dfa0d0ae470"},{"fixed":"042b101d7bf70616c4967c286ffa6fcca65babfb"},{"fixed":"46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47697.json"}}],"schema_version":"1.7.5"}