{"id":"CVE-2025-37770","summary":"drm/amd/pm: Prevent division by zero","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Prevent division by zero\n\nThe user can set any speed value.\nIf speed is greater than UINT_MAX/8, division by zero is possible.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-04-02T12:47:28.578550Z","published":"2025-05-01T13:07:10.353Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37770.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05de66de280ea1bd0459c994bfd2dd332cfbc2a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0c02fcbe4a1393a3c02da6ae35e72493cfdb2155"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4b8c3c0d17c07f301011e2908fecd2ebdcfe3d1c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/587de3ca7875c06fe3c3aa4073a85c4eff46591f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/836a189fb422e7efb81c51d5160e47ec7bc11500"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd4d90adbca1862d03e581e10e74ab73ec75e61b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e109528bbf460e50074c156253d9080d223ee37f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37770.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37770"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c52dcf49195d06319189c7f1dd8b62bfca545197"},{"fixed":"e109528bbf460e50074c156253d9080d223ee37f"},{"fixed":"0c02fcbe4a1393a3c02da6ae35e72493cfdb2155"},{"fixed":"836a189fb422e7efb81c51d5160e47ec7bc11500"},{"fixed":"587de3ca7875c06fe3c3aa4073a85c4eff46591f"},{"fixed":"bd4d90adbca1862d03e581e10e74ab73ec75e61b"},{"fixed":"05de66de280ea1bd0459c994bfd2dd332cfbc2a9"},{"fixed":"4b8c3c0d17c07f301011e2908fecd2ebdcfe3d1c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37770.json"}}],"schema_version":"1.7.5"}