Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-50205
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 Nov, 2024 | 06:07
Updated At-12 May, 2026 | 12:00
Rejected At-
▼CVE Numbering Authority (CNA)
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() The step variable is initialized to zero. It is changed in the loop, but if it's not changed it will remain zero. Add a variable check before the division. The observed behavior was introduced by commit 826b5de90c0b ("ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size"), and it is difficult to show that any of the interval parameters will satisfy the snd_interval_test() condition with data from the amdtp_rate_table[] table. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/firewire/amdtp-stream.c
Default Status
unaffected
Versions
Affected
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before d575414361630b8b0523912532fcd7c79e43468c (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before 5e431f85c87bbffd93a9830d5a576586f9855291 (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before 7d4eb9e22131ec154e638cbd56629195c9bcbe9a (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before d2826873db70a6719cdd9212a6739f3e6234cfc4 (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before 4bdc21506f12b2d432b1f2667e5ff4c75eee58e3 (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before 3452d39c4704aa12504e4190298c721fb01083c3 (git)
  • From 826b5de90c0bca4e9de6231da9e1730480621588 before 72cafe63b35d06b5cfbaf807e90ae657907858da (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/firewire/amdtp-stream.c
Default Status
affected
Versions
Affected
  • 4.20
Unaffected
  • From 0 before 4.20 (semver)
  • From 5.4.285 through 5.4.* (semver)
  • From 5.10.229 through 5.10.* (semver)
  • From 5.15.170 through 5.15.* (semver)
  • From 6.1.115 through 6.1.* (semver)
  • From 6.6.59 through 6.6.* (semver)
  • From 6.11.6 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/d575414361630b8b0523912532fcd7c79e43468c
N/A
https://git.kernel.org/stable/c/5e431f85c87bbffd93a9830d5a576586f9855291
N/A
https://git.kernel.org/stable/c/7d4eb9e22131ec154e638cbd56629195c9bcbe9a
N/A
https://git.kernel.org/stable/c/d2826873db70a6719cdd9212a6739f3e6234cfc4
N/A
https://git.kernel.org/stable/c/4bdc21506f12b2d432b1f2667e5ff4c75eee58e3
N/A
https://git.kernel.org/stable/c/3452d39c4704aa12504e4190298c721fb01083c3
N/A
https://git.kernel.org/stable/c/72cafe63b35d06b5cfbaf807e90ae657907858da
N/A
Hyperlink: https://git.kernel.org/stable/c/d575414361630b8b0523912532fcd7c79e43468c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5e431f85c87bbffd93a9830d5a576586f9855291
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7d4eb9e22131ec154e638cbd56629195c9bcbe9a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d2826873db70a6719cdd9212a6739f3e6234cfc4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4bdc21506f12b2d432b1f2667e5ff4c75eee58e3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3452d39c4704aa12504e4190298c721fb01083c3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/72cafe63b35d06b5cfbaf807e90ae657907858da
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-369CWE-369 Divide By Zero
Type: CWE
CWE ID: CWE-369
Description: CWE-369 Divide By Zero
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
3.
Affected Products
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 TM MFP - GNU/Linux subsystem
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert-portal.siemens.com/productcert/html/ssa-265688.html
N/A
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-265688.html
Resource: N/A
Details not found