{"id":"CVE-2024-56567","summary":"ad7780: fix division by zero in ad7780_write_raw()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nad7780: fix division by zero in ad7780_write_raw()\n\nIn the ad7780_write_raw() , val2 can be zero, which might lead to a\ndivision by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw()\nis based on iio_info's write_raw. While val is explicitly declared that\ncan be zero (in read mode), val2 is not specified to be non-zero.","modified":"2026-04-02T12:24:47.909619Z","published":"2024-12-27T14:23:10.861Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:0556-1","SUSE-SU-2025:0577-1","SUSE-SU-2025:0577-2","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56567.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/022e13518ba6cc1b4fdd291f49e4f57b2d5718e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18fb33df1de83a014d7f784089f9b124facc157f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/68e79b848196a0b0ec006009cc69da1f835d1ae8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e3a8ea3d1ada7f707de5d9d504774b4191eab66"},{"type":"WEB","url":"https://git.kernel.org/stable/c/afc1e3c00b3f5f0b4f1bc3e974fb9803cb938a90"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c174b53e95adf2eece2afc56cd9798374919f99a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f25a9f1df1f6738acf1fa05595fb6060a2c08ff1"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56567.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56567"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9085daa4abcc3a1c19ae4eb00e609842ef28275a"},{"fixed":"18fb33df1de83a014d7f784089f9b124facc157f"},{"fixed":"afc1e3c00b3f5f0b4f1bc3e974fb9803cb938a90"},{"fixed":"68e79b848196a0b0ec006009cc69da1f835d1ae8"},{"fixed":"022e13518ba6cc1b4fdd291f49e4f57b2d5718e0"},{"fixed":"7e3a8ea3d1ada7f707de5d9d504774b4191eab66"},{"fixed":"f25a9f1df1f6738acf1fa05595fb6060a2c08ff1"},{"fixed":"c174b53e95adf2eece2afc56cd9798374919f99a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56567.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}