{"id":"CVE-2024-50287","summary":"media: v4l2-tpg: prevent the risk of a division by zero","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-tpg: prevent the risk of a division by zero\n\nAs reported by Coverity, the logic at tpg_precalculate_line()\nblindly rescales the buffer even when scaled_witdh is equal to\nzero. If this ever happens, this will cause a division by zero.\n\nInstead, add a WARN_ON_ONCE() to trigger such cases and return\nwithout doing any precalculation.","modified":"2026-03-20T12:38:16.635301Z","published":"2024-11-19T01:30:31.338Z","related":["SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0236-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50287.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/054931ca3cfcb8e8fa036e887d6f379942b02565"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0bfc6e38ee2250f0503d96f1a1de441c31d88715"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0cdb42ba0b28f548c1a4e86bb8489dba0d78fc21"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2d0f01aa602fd15a805771bdf3f4d9a9b4df7f47"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a749c15dccc58d9cbad9cd23bd8ab4b5fa96cf47"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c63c30c9d9f2c8de34b16cd2b8400240533b914e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3c36d0bde309f690ed1f9cd5f7e63b3a513f94a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e6a3ea83fbe15d4818d01804e904cbb0e64e543b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50287.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50287"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"63881df94d3ecbb0deafa0b77da62ff2f32961c4"},{"fixed":"e3c36d0bde309f690ed1f9cd5f7e63b3a513f94a"},{"fixed":"0bfc6e38ee2250f0503d96f1a1de441c31d88715"},{"fixed":"054931ca3cfcb8e8fa036e887d6f379942b02565"},{"fixed":"a749c15dccc58d9cbad9cd23bd8ab4b5fa96cf47"},{"fixed":"c63c30c9d9f2c8de34b16cd2b8400240533b914e"},{"fixed":"2d0f01aa602fd15a805771bdf3f4d9a9b4df7f47"},{"fixed":"0cdb42ba0b28f548c1a4e86bb8489dba0d78fc21"},{"fixed":"e6a3ea83fbe15d4818d01804e904cbb0e64e543b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50287.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}