CVE-2025-37766

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 15:04

Type Values Removed Values Added
CWE CWE-369
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
References () https://git.kernel.org/stable/c/068091b796480819bf70b159f17e222ad8bea900 - () https://git.kernel.org/stable/c/068091b796480819bf70b159f17e222ad8bea900 - Patch
References () https://git.kernel.org/stable/c/42f7b5d12c28b2a601a98d10a80c6db1fe1a2900 - () https://git.kernel.org/stable/c/42f7b5d12c28b2a601a98d10a80c6db1fe1a2900 - Patch
References () https://git.kernel.org/stable/c/4e3d9508c056d7e0a56b58d5c81253e2a0d22b6c - () https://git.kernel.org/stable/c/4e3d9508c056d7e0a56b58d5c81253e2a0d22b6c - Patch
References () https://git.kernel.org/stable/c/6b9f9b998b107c7539f148a013d789ddb860c3b9 - () https://git.kernel.org/stable/c/6b9f9b998b107c7539f148a013d789ddb860c3b9 - Patch
References () https://git.kernel.org/stable/c/80814924260cea431a8fc6137d11cc8cb331a10c - () https://git.kernel.org/stable/c/80814924260cea431a8fc6137d11cc8cb331a10c - Patch
References () https://git.kernel.org/stable/c/affd2241927a1e74c0aecd50c2d920dc4213c56d - () https://git.kernel.org/stable/c/affd2241927a1e74c0aecd50c2d920dc4213c56d - Patch
References () https://git.kernel.org/stable/c/ce773dd844ee19a605af27f11470887e0f2044a9 - () https://git.kernel.org/stable/c/ce773dd844ee19a605af27f11470887e0f2044a9 - Patch
References () https://git.kernel.org/stable/c/ffd688804425579a472fbd2525bedb58b1d28bd9 - () https://git.kernel.org/stable/c/ffd688804425579a472fbd2525bedb58b1d28bd9 - Patch
First Time Debian
Debian debian Linux
Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-05-01 14:15

Updated : 2025-11-05 15:04


NVD link : CVE-2025-37766

Mitre link : CVE-2025-37766

CVE.ORG link : CVE-2025-37766


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-369

Divide By Zero