CVE-2024-50290

In the Linux kernel, the following vulnerability has been resolved: media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if reading SNR registers fail, a negative number will be returned, causing an underflow when reading SNR registers. Prevent that.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*

History

19 Sep 2025, 18:51

Type Values Removed Values Added
CWE CWE-191
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/127b9076baeadd734b18ddc8f2cd93b47d5a3ea3 - () https://git.kernel.org/stable/c/127b9076baeadd734b18ddc8f2cd93b47d5a3ea3 - Patch
References () https://git.kernel.org/stable/c/3a1ed994d9454132354b860321414955da289929 - () https://git.kernel.org/stable/c/3a1ed994d9454132354b860321414955da289929 - Patch
References () https://git.kernel.org/stable/c/576a307a7650bd544fbb24df801b9b7863b85e2f - () https://git.kernel.org/stable/c/576a307a7650bd544fbb24df801b9b7863b85e2f - Patch
References () https://git.kernel.org/stable/c/828047c70f4716fde4b1316f7b610e97a4e83824 - () https://git.kernel.org/stable/c/828047c70f4716fde4b1316f7b610e97a4e83824 - Patch
References () https://git.kernel.org/stable/c/83c152b55d88cbf6fc4685941fcb31333986774d - () https://git.kernel.org/stable/c/83c152b55d88cbf6fc4685941fcb31333986774d - Patch
References () https://git.kernel.org/stable/c/cad97ca8cfd43a78a19b59949f33e3563d369247 - () https://git.kernel.org/stable/c/cad97ca8cfd43a78a19b59949f33e3563d369247 - Patch
References () https://git.kernel.org/stable/c/f2b4f277c41db8d548f38f1dd091bbdf6a5acb07 - () https://git.kernel.org/stable/c/f2b4f277c41db8d548f38f1dd091bbdf6a5acb07 - Patch
References () https://git.kernel.org/stable/c/fbefe31e4598cdb0889eee2e74c995b2212efb08 - () https://git.kernel.org/stable/c/fbefe31e4598cdb0889eee2e74c995b2212efb08 - Patch

Information

Published : 2024-11-19 02:16

Updated : 2025-10-01 21:16


NVD link : CVE-2024-50290

Mitre link : CVE-2024-50290

CVE.ORG link : CVE-2024-50290


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)