CVE-2025-38205
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-04

Last updated on: 2025-11-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 [Why] If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated then they can lead to a divide by zero in downstream callers like CalculateVMAndRowBytes() [How] Initialize dummy value to a value to avoid divide by zero.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-04
Last Modified
2025-11-18
Generated
2026-05-07
AI Q&A
2025-07-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-369 The product divides a value by zero.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

A divide by zero error in the kernel can cause system instability, crashes, or potential denial of service, impacting the reliability of systems using the affected AMD display driver in the Linux kernel.


What immediate steps should I take to mitigate this vulnerability?

Update the Linux kernel to a version that includes the fix for this vulnerability, which initializes the dummy pitch to 1 in drm/amd/display to avoid divide by zero errors.


Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's AMD display driver occurs because dummy values in the function populate_dummy_dml_surface_cfg() are not updated, which can lead to a divide by zero error in functions like CalculateVMAndRowBytes(). The issue is fixed by initializing the dummy pitch value to 1 to avoid division by zero.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart