cve/2024/CVE-2024-50233.md
2025-09-29 21:09:30 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2024-50233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.6.39%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ea707584bac187c9c6c64c4eacd1c09bcc08f37b%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()In the ad9832_write_frequency() function, clk_get_rate() might return 0.This can lead to a division by zero when calling ad9832_calc_freqreg().The check if (fout > (clk_get_rate(st->mclk) / 2)) does not protectagainst the case when fout is 0. The ad9832_write_frequency() functionis called from ad9832_write(), and fout is derived from a text buffer,which can contain any value.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/w4zu/Debian_security