{"id":"CVE-2025-37766","summary":"drm/amd/pm: Prevent division by zero","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Prevent division by zero\n\nThe user can set any speed value.\nIf speed is greater than UINT_MAX/8, division by zero is possible.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-05-07T04:16:40.873743Z","published":"2025-05-01T13:07:07.168Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37766.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/068091b796480819bf70b159f17e222ad8bea900"},{"type":"WEB","url":"https://git.kernel.org/stable/c/42f7b5d12c28b2a601a98d10a80c6db1fe1a2900"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e3d9508c056d7e0a56b58d5c81253e2a0d22b6c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6b9f9b998b107c7539f148a013d789ddb860c3b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80814924260cea431a8fc6137d11cc8cb331a10c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/affd2241927a1e74c0aecd50c2d920dc4213c56d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce773dd844ee19a605af27f11470887e0f2044a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ffd688804425579a472fbd2525bedb58b1d28bd9"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37766.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37766"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"031db09017da532d4dc7bbba8c734cfc80f49f34"},{"fixed":"6b9f9b998b107c7539f148a013d789ddb860c3b9"},{"fixed":"ce773dd844ee19a605af27f11470887e0f2044a9"},{"fixed":"80814924260cea431a8fc6137d11cc8cb331a10c"},{"fixed":"ffd688804425579a472fbd2525bedb58b1d28bd9"},{"fixed":"068091b796480819bf70b159f17e222ad8bea900"},{"fixed":"42f7b5d12c28b2a601a98d10a80c6db1fe1a2900"},{"fixed":"affd2241927a1e74c0aecd50c2d920dc4213c56d"},{"fixed":"4e3d9508c056d7e0a56b58d5c81253e2a0d22b6c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37766.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.293"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.237"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.181"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.135"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.88"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.25"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.14.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37766.json"}}],"schema_version":"1.7.5"}