{"id":"CVE-2024-50205","summary":"ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()\n\nThe step variable is initialized to zero. It is changed in the loop,\nbut if it's not changed it will remain zero. Add a variable check\nbefore the division.\n\nThe observed behavior was introduced by commit 826b5de90c0b\n(\"ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size\"),\nand it is difficult to show that any of the interval parameters will\nsatisfy the snd_interval_test() condition with data from the\namdtp_rate_table[] table.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-05-07T04:18:03.092548Z","published":"2024-11-08T06:07:55.993Z","related":["SUSE-SU-2024:4313-1","SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4317-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4345-1","SUSE-SU-2024:4346-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2024:4388-1","SUSE-SU-2025:1416-1","SUSE-SU-2025:1422-1","SUSE-SU-2025:1423-1","SUSE-SU-2025:1425-1","SUSE-SU-2025:1445-1","SUSE-SU-2025:1448-1","SUSE-SU-2025:1454-1","SUSE-SU-2025:1463-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50205.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3452d39c4704aa12504e4190298c721fb01083c3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4bdc21506f12b2d432b1f2667e5ff4c75eee58e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e431f85c87bbffd93a9830d5a576586f9855291"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72cafe63b35d06b5cfbaf807e90ae657907858da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7d4eb9e22131ec154e638cbd56629195c9bcbe9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d2826873db70a6719cdd9212a6739f3e6234cfc4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d575414361630b8b0523912532fcd7c79e43468c"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50205.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50205"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"826b5de90c0bca4e9de6231da9e1730480621588"},{"fixed":"d575414361630b8b0523912532fcd7c79e43468c"},{"fixed":"5e431f85c87bbffd93a9830d5a576586f9855291"},{"fixed":"7d4eb9e22131ec154e638cbd56629195c9bcbe9a"},{"fixed":"d2826873db70a6719cdd9212a6739f3e6234cfc4"},{"fixed":"4bdc21506f12b2d432b1f2667e5ff4c75eee58e3"},{"fixed":"3452d39c4704aa12504e4190298c721fb01083c3"},{"fixed":"72cafe63b35d06b5cfbaf807e90ae657907858da"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50205.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.285"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.170"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.59"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.11.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50205.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}