CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-frontends: tda10048: Fix integer overflow
state->xtal_hz can be up to 16M, so it can overflow a 32 bit integer
when multiplied by pll_mfactor.
Create a new 64 bit variable to hold the calculations.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/1aa1329a67cc214c3b7bd2a14d1301a795760b07 (6.10-rc1)
git.kernel.org/stable/c/1121d8a5c6ed6b8fad492e43b63b386cb6a3a9d8
git.kernel.org/stable/c/1663e2474e4d777187d749a5c90ae83232db32bd
git.kernel.org/stable/c/1aa1329a67cc214c3b7bd2a14d1301a795760b07
git.kernel.org/stable/c/5c72587d024f087aecec0221eaff2fe850d856ce
git.kernel.org/stable/c/8167e4d7dc086d4f7ca7897dcff3827e4d22c99a
git.kernel.org/stable/c/8ac224e9371dc3c4eb666033e6b42d05cf5184a1
git.kernel.org/stable/c/bd5620439959a7e02012588c724c6ff5143b80af
git.kernel.org/stable/c/e1ba22618758e95e09c9fd30c69ccce38edf94c0
launchpad.net/bugs/cve/CVE-2024-42223
nvd.nist.gov/vuln/detail/CVE-2024-42223
security-tracker.debian.org/tracker/CVE-2024-42223
www.cve.org/CVERecord?id=CVE-2024-42223