In the Linux kernel, the following vulnerability has been resolved:
media: cx24116: prevent overflows on SNR calculus
as reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.
Prevent that.
References
Configurations
Configuration 1 (hide)
|
History
19 Sep 2025, 18:51
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-191 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/127b9076baeadd734b18ddc8f2cd93b47d5a3ea3 - Patch | |
| References | () https://git.kernel.org/stable/c/3a1ed994d9454132354b860321414955da289929 - Patch | |
| References | () https://git.kernel.org/stable/c/576a307a7650bd544fbb24df801b9b7863b85e2f - Patch | |
| References | () https://git.kernel.org/stable/c/828047c70f4716fde4b1316f7b610e97a4e83824 - Patch | |
| References | () https://git.kernel.org/stable/c/83c152b55d88cbf6fc4685941fcb31333986774d - Patch | |
| References | () https://git.kernel.org/stable/c/cad97ca8cfd43a78a19b59949f33e3563d369247 - Patch | |
| References | () https://git.kernel.org/stable/c/f2b4f277c41db8d548f38f1dd091bbdf6a5acb07 - Patch | |
| References | () https://git.kernel.org/stable/c/fbefe31e4598cdb0889eee2e74c995b2212efb08 - Patch |
Information
Published : 2024-11-19 02:16
Updated : 2025-10-01 21:16
NVD link : CVE-2024-50290
Mitre link : CVE-2024-50290
CVE.ORG link : CVE-2024-50290
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
