CVE-2025-39954Divide By Zero in Linux

CWE-369Divide By Zero5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: mp: Fix dual-divider clock rate readback When dual-divider clock support was introduced, the P divider offset was left out of the .recalc_rate readback function. This causes the clock rate to become bogus or even zero (possibly due to the P divider being 1, leading to a divide-by-zero). Fix this by incorporating the P divider offset into the calculation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.156.16.9+1
Debianlinux/linux_kernel< 6.16.9-1
CVEListV5linux/linux45717804b75eda8a76eacc04509ca4d68dd2caaf40108f69c372af3aea73e7829d6849a44638d662+2
debiandebian/linux< linux 6.16.9-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-39954: In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: mp: Fix dual-divider clock rate readback When dual-divider clock su2025-10-09
GHSA
GHSA-g295-3qg8-vf4w: In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: mp: Fix dual-divider clock rate readback When dual-divider clock2025-10-09

📋Vendor Advisories

2
Red Hat
kernel: clk: sunxi-ng: mp: Fix dual-divider clock rate readback2025-10-09
Debian
CVE-2025-39954: linux - In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-...2025