๐Ÿ” CVE Alert

CVE-2024-47663

UNKNOWN 0.0

staging: iio: frequency: ad9834: Validate frequency parameter value

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: staging: iio: frequency: ad9834: Validate frequency parameter value In ad9834_write_frequency() clk_get_rate() can return 0. In such case ad9834_calc_freqreg() call will lead to division by zero. Checking 'if (fout > (clk_freq / 2))' doesn't protect in case of 'fout' is 0. ad9834_write_frequency() is called from ad9834_write(), where fout is taken from text buffer, which can contain any value. Modify parameters checking. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < 5edc3a45ef428501000a7b23d0e1777a548907f6 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < 0e727707a239d5c519fc9abc2f0fd913516a7e47 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < 41cc91e3138fe52f8da92a81bebcd0e6cf488c53 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < d8b09a5edc4a634373158c1a405491de3c52e58a 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < 3ba9abfcaa9e16bb91ed7e0e2b42e94a157a953e 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < dc12e49f970b08d8b007b8981b97e2eb93c0e89d 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < 8961b245e8f92bccbaacfbbdf69eba60e3e7c227 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 < b48aa991758999d4e8f9296c5bbe388f293ef465
Linux / Linux
2.6.38

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5edc3a45ef428501000a7b23d0e1777a548907f6 git.kernel.org: https://git.kernel.org/stable/c/0e727707a239d5c519fc9abc2f0fd913516a7e47 git.kernel.org: https://git.kernel.org/stable/c/41cc91e3138fe52f8da92a81bebcd0e6cf488c53 git.kernel.org: https://git.kernel.org/stable/c/d8b09a5edc4a634373158c1a405491de3c52e58a git.kernel.org: https://git.kernel.org/stable/c/3ba9abfcaa9e16bb91ed7e0e2b42e94a157a953e git.kernel.org: https://git.kernel.org/stable/c/dc12e49f970b08d8b007b8981b97e2eb93c0e89d git.kernel.org: https://git.kernel.org/stable/c/8961b245e8f92bccbaacfbbdf69eba60e3e7c227 git.kernel.org: https://git.kernel.org/stable/c/b48aa991758999d4e8f9296c5bbe388f293ef465 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html