CVE-2025-37768

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 15:03

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-369
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3cdd02cb70682d7d205ca6dc02a4d1eb76758d24 - () https://git.kernel.org/stable/c/3cdd02cb70682d7d205ca6dc02a4d1eb76758d24 - Patch
References () https://git.kernel.org/stable/c/5fc4fb54f6f064c25bfbbfd443aa861d3422dd4c - () https://git.kernel.org/stable/c/5fc4fb54f6f064c25bfbbfd443aa861d3422dd4c - Patch
References () https://git.kernel.org/stable/c/7c246a05df51c52fe0852ce56ba10c41e6ed1f39 - () https://git.kernel.org/stable/c/7c246a05df51c52fe0852ce56ba10c41e6ed1f39 - Patch
References () https://git.kernel.org/stable/c/8e9c4f8d197d5709c75effa5d58e80b4fa01981a - () https://git.kernel.org/stable/c/8e9c4f8d197d5709c75effa5d58e80b4fa01981a - Patch
References () https://git.kernel.org/stable/c/9e4f1e21fe7b93a8ef57db433071266c2590e260 - () https://git.kernel.org/stable/c/9e4f1e21fe7b93a8ef57db433071266c2590e260 - Patch
References () https://git.kernel.org/stable/c/b0742a709be7979c7a480772046a1f36d09dab00 - () https://git.kernel.org/stable/c/b0742a709be7979c7a480772046a1f36d09dab00 - Patch
References () https://git.kernel.org/stable/c/be0fffc4152aac4f0291ed2d793f3cfee788449d - () https://git.kernel.org/stable/c/be0fffc4152aac4f0291ed2d793f3cfee788449d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/pm: Impide la división por cero. El usuario puede establecer cualquier valor de velocidad. Si la velocidad es superior a UINT_MAX/8, es posible la división por cero. Encontrada por el Centro de Verificación de Linux (linuxtesting.org) con SVACE.

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3cdd02cb70682d7d205ca6dc02a4d1eb76758d24 -
  • () https://git.kernel.org/stable/c/be0fffc4152aac4f0291ed2d793f3cfee788449d -

01 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 14:15

Updated : 2025-11-05 15:03


NVD link : CVE-2025-37768

Mitre link : CVE-2025-37768

CVE.ORG link : CVE-2025-37768


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-369

Divide By Zero