CVE-2024-50232

Source
https://cve.org/CVERecord?id=CVE-2024-50232
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50232.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50232
Downstream
Related
Published
2024-11-09T10:14:42.414Z
Modified
2026-03-20T12:39:38.764312Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: fix division by zero in ad7124setchannel_odr()

In the ad7124writeraw() function, parameter val can potentially be zero. This may lead to a division by zero when DIVROUNDCLOSEST() is called within ad7124setchannelodr(). The ad7124writeraw() function is invoked through the sequence: iiowritechannelraw() -> iiowritechannelattribute() -> iiochannel_write(), with no checks in place to ensure val is non-zero.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50232.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b8d045e497a04dd88546da51f34fa3b102778d2
Fixed
4f588fffc307a4bc2761aee6ff275bb4b433e451
Fixed
f51343f346e6abde094548a7fb34472b0d4cae91
Fixed
3dc0eda2cd5c653b162852ae5f0631bfe4ca5e95
Fixed
0ac0beb4235a9a474f681280a3bd4e2a5bb66569
Fixed
efa353ae1b0541981bc96dbf2e586387d0392baa

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50232.json"