CVE-2024-50233

In the Linux kernel, the following vulnerability has been resolved: staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() In the ad9832_write_frequency() function, clk_get_rate() might return 0. This can lead to a division by zero when calling ad9832_calc_freqreg(). The check if (fout > (clk_get_rate(st->mclk) / 2)) does not protect against the case when fout is 0. The ad9832_write_frequency() function is called from ad9832_write(), and fout is derived from a text buffer, which can contain any value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

13 Nov 2024, 18:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2f39548f45693d86e950647012a214da6917dc9f - () https://git.kernel.org/stable/c/2f39548f45693d86e950647012a214da6917dc9f - Patch
References () https://git.kernel.org/stable/c/442f786c5bff8cfd756ebdeaa4aadbf05c22aa5a - () https://git.kernel.org/stable/c/442f786c5bff8cfd756ebdeaa4aadbf05c22aa5a - Patch
References () https://git.kernel.org/stable/c/6bd301819f8f69331a55ae2336c8b111fc933f3d - () https://git.kernel.org/stable/c/6bd301819f8f69331a55ae2336c8b111fc933f3d - Patch
References () https://git.kernel.org/stable/c/adfbc08b94e7df08b9ed5fa26b969cc1b54c84ec - () https://git.kernel.org/stable/c/adfbc08b94e7df08b9ed5fa26b969cc1b54c84ec - Patch
References () https://git.kernel.org/stable/c/ccbc10647aafe2b7506edb4b10e19c6c2416c162 - () https://git.kernel.org/stable/c/ccbc10647aafe2b7506edb4b10e19c6c2416c162 - Patch
References () https://git.kernel.org/stable/c/dd9e1cf619c945f320e686dcaf13e37ef0b05fdd - () https://git.kernel.org/stable/c/dd9e1cf619c945f320e686dcaf13e37ef0b05fdd - Patch
References () https://git.kernel.org/stable/c/fcd6b59f7a774558e2525251c68aa37aff748e55 - () https://git.kernel.org/stable/c/fcd6b59f7a774558e2525251c68aa37aff748e55 - Patch
CWE CWE-369
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: iio: frequency: ad9832: arregla la división por cero en ad9832_calc_freqreg() En la función ad9832_write_frequency(), clk_get_rate() podría devolver 0. Esto puede provocar una división por cero al llamar a ad9832_calc_freqreg(). La comprobación if (fout > (clk_get_rate(st->mclk) / 2)) no protege contra el caso en el que fout sea 0. La función ad9832_write_frequency() se llama desde ad9832_write(), y fout se deriva de un búfer de texto, que puede contener cualquier valor.

09 Nov 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 11:15

Updated : 2024-11-13 18:25


NVD link : CVE-2024-50233

Mitre link : CVE-2024-50233

CVE.ORG link : CVE-2024-50233


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-369

Divide By Zero