๐Ÿ” CVE Alert

CVE-2025-38312

UNKNOWN 0.0

fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() In fb_find_mode_cvt(), iff mode->refresh somehow happens to be 0x80000000, cvt.f_refresh will become 0 when multiplying it by 2 due to overflow. It's then passed to fb_cvt_hperiod(), where it's used as a divider -- division by 0 will result in kernel oops. Add a sanity check for cvt.f_refresh to avoid such overflow... Found by Linux Verification Center (linuxtesting.org) with the Svace static analysis tool.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
96fe6a2109db29cd15b90a093c16e6cb4b19371a < 9027ce4c037b566b658b8939a76326b7125e3627 96fe6a2109db29cd15b90a093c16e6cb4b19371a < 610f247f2772e4f92b63442125a1b7ade79898d8 96fe6a2109db29cd15b90a093c16e6cb4b19371a < 2d63433e8eaa3c91b2948190e395bc67009db0d9 96fe6a2109db29cd15b90a093c16e6cb4b19371a < 54947530663edcbaaee1314c01fdd8c72861b124 96fe6a2109db29cd15b90a093c16e6cb4b19371a < ab91647acdf43b984824776559a452212eaeb21a 96fe6a2109db29cd15b90a093c16e6cb4b19371a < b235393b9f43ff86a38ca2bde6372312ea215dc5 96fe6a2109db29cd15b90a093c16e6cb4b19371a < 53784073cbad18f75583fd3da9ffdfc4d1f05405 96fe6a2109db29cd15b90a093c16e6cb4b19371a < 3f6dae09fc8c306eb70fdfef70726e1f154e173a
Linux / Linux
2.6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9027ce4c037b566b658b8939a76326b7125e3627 git.kernel.org: https://git.kernel.org/stable/c/610f247f2772e4f92b63442125a1b7ade79898d8 git.kernel.org: https://git.kernel.org/stable/c/2d63433e8eaa3c91b2948190e395bc67009db0d9 git.kernel.org: https://git.kernel.org/stable/c/54947530663edcbaaee1314c01fdd8c72861b124 git.kernel.org: https://git.kernel.org/stable/c/ab91647acdf43b984824776559a452212eaeb21a git.kernel.org: https://git.kernel.org/stable/c/b235393b9f43ff86a38ca2bde6372312ea215dc5 git.kernel.org: https://git.kernel.org/stable/c/53784073cbad18f75583fd3da9ffdfc4d1f05405 git.kernel.org: https://git.kernel.org/stable/c/3f6dae09fc8c306eb70fdfef70726e1f154e173a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html