CVE-2024-42223

Source
https://cve.org/CVERecord?id=CVE-2024-42223
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42223.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42223
Downstream
Related
Published
2024-07-30T07:47:04.861Z
Modified
2026-03-13T07:56:14.528934Z
Summary
media: dvb-frontends: tda10048: Fix integer overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: tda10048: Fix integer overflow

state->xtalhz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pllmfactor.

Create a new 64 bit variable to hold the calculations.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42223.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d114153816ec188b20a37583e66da33d8b2798fe
Fixed
8167e4d7dc086d4f7ca7897dcff3827e4d22c99a
Fixed
5c72587d024f087aecec0221eaff2fe850d856ce
Fixed
e1ba22618758e95e09c9fd30c69ccce38edf94c0
Fixed
bd5620439959a7e02012588c724c6ff5143b80af
Fixed
1663e2474e4d777187d749a5c90ae83232db32bd
Fixed
8ac224e9371dc3c4eb666033e6b42d05cf5184a1
Fixed
1121d8a5c6ed6b8fad492e43b63b386cb6a3a9d8
Fixed
1aa1329a67cc214c3b7bd2a14d1301a795760b07

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42223.json"