Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2024-42223 First vendor Publication 2024-07-30
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: tda10048: Fix integer overflow

state->xtal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.

Create a new 64 bit variable to hold the calculations.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/1121d8a5c6ed6b8fad492e43b63b386cb6a3a9d8
https://git.kernel.org/stable/c/1663e2474e4d777187d749a5c90ae83232db32bd
https://git.kernel.org/stable/c/1aa1329a67cc214c3b7bd2a14d1301a795760b07
https://git.kernel.org/stable/c/5c72587d024f087aecec0221eaff2fe850d856ce
https://git.kernel.org/stable/c/8167e4d7dc086d4f7ca7897dcff3827e4d22c99a
https://git.kernel.org/stable/c/8ac224e9371dc3c4eb666033e6b42d05cf5184a1
https://git.kernel.org/stable/c/bd5620439959a7e02012588c724c6ff5143b80af
https://git.kernel.org/stable/c/e1ba22618758e95e09c9fd30c69ccce38edf94c0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Date Informations
2025-01-08 03:04:11
  • Multiple Updates
2025-01-07 03:03:44
  • Multiple Updates
2024-12-25 03:02:21
  • Multiple Updates
2024-12-12 03:05:17
  • Multiple Updates
2024-11-25 09:23:16
  • Multiple Updates
2024-11-22 21:22:30
  • Multiple Updates
2024-11-21 21:22:01
  • Multiple Updates
2024-11-20 02:58:54
  • Multiple Updates
2024-11-14 02:59:12
  • Multiple Updates
2024-11-09 02:59:13
  • Multiple Updates
2024-10-26 02:56:37
  • Multiple Updates
2024-10-25 02:58:31
  • Multiple Updates
2024-10-23 02:57:44
  • Multiple Updates
2024-10-03 02:53:02
  • Multiple Updates
2024-10-02 02:51:26
  • Multiple Updates
2024-09-15 02:49:08
  • Multiple Updates
2024-09-12 02:48:41
  • Multiple Updates
2024-09-07 02:47:40
  • Multiple Updates
2024-09-06 02:46:50
  • Multiple Updates
2024-09-04 02:50:02
  • Multiple Updates
2024-08-22 02:47:54
  • Multiple Updates
2024-08-02 21:27:26
  • Multiple Updates
2024-07-30 17:27:23
  • Multiple Updates
2024-07-30 13:27:26
  • First insertion