CVE-2025-39954
BaseFortify
Publication date: 2025-10-09
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 6.15 (inc) to 6.16.9 (inc) |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-369 | The product divides a value by zero. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's clock subsystem for sunxi-ng hardware. When support for dual-divider clocks was added, the code that reads back the clock rate did not correctly include the P divider offset. As a result, the clock rate calculation could be incorrect or even zero, potentially due to a divide-by-zero error when the P divider is 1. The fix involved updating the calculation to properly incorporate the P divider offset.
How can this vulnerability impact me? :
This vulnerability can cause the system clock rate to be reported incorrectly or as zero, which may lead to timing issues or malfunction of hardware components relying on accurate clock rates. This could affect system stability or performance on affected hardware platforms.