๐Ÿ” CVE Alert

CVE-2025-37850

UNKNOWN 0.0

pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() With CONFIG_COMPILE_TEST && !CONFIG_HAVE_CLK, pwm_mediatek_config() has a divide-by-zero in the following line: do_div(resolution, clk_get_rate(pc->clk_pwms[pwm->hwpwm])); due to the fact that the !CONFIG_HAVE_CLK version of clk_get_rate() returns zero. This is presumably just a theoretical problem: COMPILE_TEST overrides the dependency on RALINK which would select COMMON_CLK. Regardless it's a good idea to check for the error explicitly to avoid divide-by-zero. Fixes the following warning: drivers/pwm/pwm-mediatek.o: warning: objtool: .text: unexpected end of section [ukleinek: s/CONFIG_CLK/CONFIG_HAVE_CLK/]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
caf065f8fd583b43a3f95d84c8a0a0d07597963b < 8b9f60725d74b72c238e4437c957d0217746b506 caf065f8fd583b43a3f95d84c8a0a0d07597963b < e1206d8e1651c9f62e5640b69b14d925b1a0a00a caf065f8fd583b43a3f95d84c8a0a0d07597963b < e3cf0c38d3ce754ad63005102fcfeb0b7ff3290b caf065f8fd583b43a3f95d84c8a0a0d07597963b < f3e9cf266c2c103cf071e15d7a17e2c699fff3c5 caf065f8fd583b43a3f95d84c8a0a0d07597963b < 8ddbec73ea2598d8414e8f7103241b55cf877010 caf065f8fd583b43a3f95d84c8a0a0d07597963b < 4cb15042b5f3ec0474e91cf379120cc597625dbb caf065f8fd583b43a3f95d84c8a0a0d07597963b < c343856ff2689ce0afef823592732fc178ef4aac caf065f8fd583b43a3f95d84c8a0a0d07597963b < 77fb96dbe350e8a5ae4965ff9f6e7049f3966a6b caf065f8fd583b43a3f95d84c8a0a0d07597963b < 7ca59947b5fcf94e7ea4029d1bd0f7c41500a161
Linux / Linux
4.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8b9f60725d74b72c238e4437c957d0217746b506 git.kernel.org: https://git.kernel.org/stable/c/e1206d8e1651c9f62e5640b69b14d925b1a0a00a git.kernel.org: https://git.kernel.org/stable/c/e3cf0c38d3ce754ad63005102fcfeb0b7ff3290b git.kernel.org: https://git.kernel.org/stable/c/f3e9cf266c2c103cf071e15d7a17e2c699fff3c5 git.kernel.org: https://git.kernel.org/stable/c/8ddbec73ea2598d8414e8f7103241b55cf877010 git.kernel.org: https://git.kernel.org/stable/c/4cb15042b5f3ec0474e91cf379120cc597625dbb git.kernel.org: https://git.kernel.org/stable/c/c343856ff2689ce0afef823592732fc178ef4aac git.kernel.org: https://git.kernel.org/stable/c/77fb96dbe350e8a5ae4965ff9f6e7049f3966a6b git.kernel.org: https://git.kernel.org/stable/c/7ca59947b5fcf94e7ea4029d1bd0f7c41500a161 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html