CVE-2024-50287

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity, the logic at tpg_precalculate_line() blindly rescales the buffer even when scaled_witdh is equal to zero. If this ever happens, this will cause a division by zero. Instead, add a WARN_ON_ONCE() to trigger such cases and return without doing any precalculation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*

History

21 Nov 2024, 21:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/054931ca3cfcb8e8fa036e887d6f379942b02565 - () https://git.kernel.org/stable/c/054931ca3cfcb8e8fa036e887d6f379942b02565 - Patch
References () https://git.kernel.org/stable/c/0bfc6e38ee2250f0503d96f1a1de441c31d88715 - () https://git.kernel.org/stable/c/0bfc6e38ee2250f0503d96f1a1de441c31d88715 - Patch
References () https://git.kernel.org/stable/c/0cdb42ba0b28f548c1a4e86bb8489dba0d78fc21 - () https://git.kernel.org/stable/c/0cdb42ba0b28f548c1a4e86bb8489dba0d78fc21 - Patch
References () https://git.kernel.org/stable/c/2d0f01aa602fd15a805771bdf3f4d9a9b4df7f47 - () https://git.kernel.org/stable/c/2d0f01aa602fd15a805771bdf3f4d9a9b4df7f47 - Patch
References () https://git.kernel.org/stable/c/a749c15dccc58d9cbad9cd23bd8ab4b5fa96cf47 - () https://git.kernel.org/stable/c/a749c15dccc58d9cbad9cd23bd8ab4b5fa96cf47 - Patch
References () https://git.kernel.org/stable/c/c63c30c9d9f2c8de34b16cd2b8400240533b914e - () https://git.kernel.org/stable/c/c63c30c9d9f2c8de34b16cd2b8400240533b914e - Patch
References () https://git.kernel.org/stable/c/e3c36d0bde309f690ed1f9cd5f7e63b3a513f94a - () https://git.kernel.org/stable/c/e3c36d0bde309f690ed1f9cd5f7e63b3a513f94a - Patch
References () https://git.kernel.org/stable/c/e6a3ea83fbe15d4818d01804e904cbb0e64e543b - () https://git.kernel.org/stable/c/e6a3ea83fbe15d4818d01804e904cbb0e64e543b - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
CWE CWE-369
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

19 Nov 2024, 21:57

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: v4l2-tpg: evitar el riesgo de una división por cero Como lo informó Coverity, la lógica en tpg_precalculate_line() reescala ciegamente el búfer incluso cuando scaled_witdh es igual a cero. Si esto sucede alguna vez, provocará una división por cero. En su lugar, agregue un WARN_ON_ONCE() para activar dichos casos y regresar sin realizar ningún cálculo previo.

19 Nov 2024, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-19 02:16

Updated : 2024-11-21 21:11


NVD link : CVE-2024-50287

Mitre link : CVE-2024-50287

CVE.ORG link : CVE-2024-50287


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-369

Divide By Zero