In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
05 Nov 2025, 15:02
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-369 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/402964994e8ece29702383b234fabcf04791ff95 - Patch | |
| References | () https://git.kernel.org/stable/c/5096174074114f83c700a27869c54362cbb10f3e - Patch | |
| References | () https://git.kernel.org/stable/c/6413fed016208171592c88b5df002af8a1387e24 - Patch | |
| References | () https://git.kernel.org/stable/c/7d641c2b83275d3b0424127b2e0d2d0f7dd82aef - Patch | |
| References | () https://git.kernel.org/stable/c/b7c41df4913789ebfe73cc1e17c6401d4c5eab69 - Patch | |
| References | () https://git.kernel.org/stable/c/baa54adb5e0599299b8f088efb5544d876a3eb62 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 May 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 14:15
Updated : 2025-11-05 15:02
NVD link : CVE-2025-37771
Mitre link : CVE-2025-37771
CVE.ORG link : CVE-2025-37771
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-369
Divide By Zero
