{"id":"CVE-2024-47663","summary":"staging: iio: frequency: ad9834: Validate frequency parameter value","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: iio: frequency: ad9834: Validate frequency parameter value\n\nIn ad9834_write_frequency() clk_get_rate() can return 0. In such case\nad9834_calc_freqreg() call will lead to division by zero. Checking\n'if (fout \u003e (clk_freq / 2))' doesn't protect in case of 'fout' is 0.\nad9834_write_frequency() is called from ad9834_write(), where fout is\ntaken from text buffer, which can contain any value.\n\nModify parameters checking.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-04-02T12:20:11.027606Z","published":"2024-10-09T14:13:56.514Z","related":["SUSE-SU-2024:3984-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47663.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0e727707a239d5c519fc9abc2f0fd913516a7e47"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ba9abfcaa9e16bb91ed7e0e2b42e94a157a953e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41cc91e3138fe52f8da92a81bebcd0e6cf488c53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5edc3a45ef428501000a7b23d0e1777a548907f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8961b245e8f92bccbaacfbbdf69eba60e3e7c227"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b48aa991758999d4e8f9296c5bbe388f293ef465"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8b09a5edc4a634373158c1a405491de3c52e58a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc12e49f970b08d8b007b8981b97e2eb93c0e89d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47663.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47663"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"12b9d5bf76bfa20d3207ef24fca9c8254a586a58"},{"fixed":"5edc3a45ef428501000a7b23d0e1777a548907f6"},{"fixed":"0e727707a239d5c519fc9abc2f0fd913516a7e47"},{"fixed":"41cc91e3138fe52f8da92a81bebcd0e6cf488c53"},{"fixed":"d8b09a5edc4a634373158c1a405491de3c52e58a"},{"fixed":"3ba9abfcaa9e16bb91ed7e0e2b42e94a157a953e"},{"fixed":"dc12e49f970b08d8b007b8981b97e2eb93c0e89d"},{"fixed":"8961b245e8f92bccbaacfbbdf69eba60e3e7c227"},{"fixed":"b48aa991758999d4e8f9296c5bbe388f293ef465"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47663.json"}}],"schema_version":"1.7.5"}