{"id":"CVE-2025-37850","summary":"pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()\n\nWith CONFIG_COMPILE_TEST && !CONFIG_HAVE_CLK, pwm_mediatek_config() has a\ndivide-by-zero in the following line:\n\n\tdo_div(resolution, clk_get_rate(pc-\u003eclk_pwms[pwm-\u003ehwpwm]));\n\ndue to the fact that the !CONFIG_HAVE_CLK version of clk_get_rate()\nreturns zero.\n\nThis is presumably just a theoretical problem: COMPILE_TEST overrides\nthe dependency on RALINK which would select COMMON_CLK.  Regardless it's\na good idea to check for the error explicitly to avoid divide-by-zero.\n\nFixes the following warning:\n\n  drivers/pwm/pwm-mediatek.o: warning: objtool: .text: unexpected end of section\n\n[ukleinek: s/CONFIG_CLK/CONFIG_HAVE_CLK/]","modified":"2026-03-20T12:42:30.666508Z","published":"2025-05-09T06:41:57.784Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37850.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4cb15042b5f3ec0474e91cf379120cc597625dbb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/77fb96dbe350e8a5ae4965ff9f6e7049f3966a6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ca59947b5fcf94e7ea4029d1bd0f7c41500a161"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b9f60725d74b72c238e4437c957d0217746b506"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ddbec73ea2598d8414e8f7103241b55cf877010"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c343856ff2689ce0afef823592732fc178ef4aac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e1206d8e1651c9f62e5640b69b14d925b1a0a00a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3cf0c38d3ce754ad63005102fcfeb0b7ff3290b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f3e9cf266c2c103cf071e15d7a17e2c699fff3c5"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37850.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37850"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"caf065f8fd583b43a3f95d84c8a0a0d07597963b"},{"fixed":"8b9f60725d74b72c238e4437c957d0217746b506"},{"fixed":"e1206d8e1651c9f62e5640b69b14d925b1a0a00a"},{"fixed":"e3cf0c38d3ce754ad63005102fcfeb0b7ff3290b"},{"fixed":"f3e9cf266c2c103cf071e15d7a17e2c699fff3c5"},{"fixed":"8ddbec73ea2598d8414e8f7103241b55cf877010"},{"fixed":"4cb15042b5f3ec0474e91cf379120cc597625dbb"},{"fixed":"c343856ff2689ce0afef823592732fc178ef4aac"},{"fixed":"77fb96dbe350e8a5ae4965ff9f6e7049f3966a6b"},{"fixed":"7ca59947b5fcf94e7ea4029d1bd0f7c41500a161"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37850.json"}}],"schema_version":"1.7.5"}