CVE-2025-37896Divide By Zero in Linux

CWE-369Divide By Zero17 documents6 sources
Severity
5.5MEDIUMNVD
OSV7.8
EPSS
0.1%
top 77.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateAug 28

Description

In the Linux kernel, the following vulnerability has been resolved: spi: spi-mem: Add fix to avoid divide error For some SPI flash memory operations, dummy bytes are not mandatory. For example, in Winbond SPINAND flash memory devices, the `write_cache` and `update_cache` operation variants have zero dummy bytes. Calculating the duration for SPI memory operations with zero dummy bytes causes a divide error when `ncycles` is calculated in the spi_mem_calc_op_duration(). Add changes to skip the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.146.14.6+1
Ubuntulinux/linux_kernel< 6.14.0-24.24
CVEListV5linux/linux226d6cb3cb799aae46d0dd19a521133997d9db111915dbd67dadc0bb35670c8e28229baa29368d17+2
debiandebian/linux

Patches

🔴Vulnerability Details

8
OSV
linux-azure vulnerabilities2025-08-28
OSV
linux-aws-6.14 vulnerabilities2025-07-24
OSV
linux-aws vulnerabilities2025-07-22
OSV
linux-oracle vulnerabilities2025-07-22
OSV
linux, linux-gcp, linux-raspi, linux-realtime vulnerabilities2025-07-17

📋Vendor Advisories

8
Ubuntu
Linux kernel (Azure) vulnerabilities2025-08-28
Ubuntu
Linux kernel (AWS) vulnerabilities2025-07-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-07-22
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-07-22
Ubuntu
Linux kernel vulnerabilities2025-07-17
CVE-2025-37896 — Divide By Zero in Linux | cvebase