CVE-2025-38125
BaseFortify
Publication date: 2025-07-03
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's stmmac driver where a value called ptp_rate can be zero. If ptp_rate is zero, it causes a division by zero error during the configuration of EST (Enhanced Scheduled Traffic). The issue is fixed by adding a check to ensure ptp_rate is not zero before proceeding with the configuration.
How can this vulnerability impact me? :
The vulnerability can cause a division by zero error in the Linux kernel's network driver, which may lead to system instability, crashes, or denial of service in affected systems using the stmmac driver.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the Linux kernel version that includes the fix for this vulnerability, which ensures that ptp_rate is checked to not be zero before configuring EST, preventing division by zero errors.