ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
Summary
| CVE | CVE-2024-50205 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-11-08 06:15:16 UTC |
| Updated | 2026-05-12 13:16:19 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() The step variable is initialized to zero. It is changed in the loop, but if it's not changed it will remain zero. Add a variable check before the division. The observed behavior was introduced by commit 826b5de90c0b ("ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size"), and it is difficult to show that any of the interval parameters will satisfy the snd_interval_test() condition with data from the amdtp_rate_table[] table. Found by Linux Verification Center (linuxtesting.org) with SVACE. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-369 | CWE-369 CWE-369 Divide By Zero
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | ADP | DECLARED | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 d575414361630b8b0523912532fcd7c79e43468c git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 5e431f85c87bbffd93a9830d5a576586f9855291 git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 7d4eb9e22131ec154e638cbd56629195c9bcbe9a git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 d2826873db70a6719cdd9212a6739f3e6234cfc4 git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 4bdc21506f12b2d432b1f2667e5ff4c75eee58e3 git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 3452d39c4704aa12504e4190298c721fb01083c3 git | Not specified |
| CNA | Linux | Linux | affected 826b5de90c0bca4e9de6231da9e1730480621588 72cafe63b35d06b5cfbaf807e90ae657907858da git | Not specified |
| CNA | Linux | Linux | affected 4.20 | Not specified |
| CNA | Linux | Linux | unaffected 4.20 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.4.285 5.4.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.229 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.170 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.115 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.59 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.11.6 6.11.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12 * original_commit_for_fix | Not specified |
| ADP | Siemens | SIMATIC S7-1500 TM MFP - GNU/Linux Subsystem | affected * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/d2826873db70a6719cdd9212a6739f3e6234cfc4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/03/msg00002.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| git.kernel.org/stable/c/d575414361630b8b0523912532fcd7c79e43468c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/72cafe63b35d06b5cfbaf807e90ae657907858da | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| cert-portal.siemens.com/productcert/html/ssa-265688.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/4bdc21506f12b2d432b1f2667e5ff4c75eee58e3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/5e431f85c87bbffd93a9830d5a576586f9855291 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/3452d39c4704aa12504e4190298c721fb01083c3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/01/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| git.kernel.org/stable/c/7d4eb9e22131ec154e638cbd56629195c9bcbe9a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.