๐Ÿ” CVE Alert

CVE-2025-39742

UNKNOWN 0.0

RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() The function divides number of online CPUs by num_core_siblings, and later checks the divider by zero. This implies a possibility to get and divide-by-zero runtime error. Fix it by moving the check prior to division. This also helps to save one indentation level.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b094a36f90975373c3a241839869217a65f17d81 < 9bba1a9994c523b44db64f63b564b4719ea2b7ef b094a36f90975373c3a241839869217a65f17d81 < 1a7cf828ed861de5be1aff99e10f114b363c19d3 b094a36f90975373c3a241839869217a65f17d81 < 9d3211cb61a0773a2440d0a0698c1e6e7429f907 b094a36f90975373c3a241839869217a65f17d81 < 4b4317b0d758ff92ba96f4e448a8992a6fe607bf b094a36f90975373c3a241839869217a65f17d81 < 89fdac333a17ed990b41565630ef4791782e02f5 b094a36f90975373c3a241839869217a65f17d81 < 9b05e91afe948ed819bf87d7ba0fccf451ed79a6 b094a36f90975373c3a241839869217a65f17d81 < 31d0599a23efdbfe579bfbd1eb8f8c942f13744d b094a36f90975373c3a241839869217a65f17d81 < ac53f377393cc85156afdc90b636e84e544a6f96 b094a36f90975373c3a241839869217a65f17d81 < 59f7d2138591ef8f0e4e4ab5f1ab674e8181ad3a
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9bba1a9994c523b44db64f63b564b4719ea2b7ef git.kernel.org: https://git.kernel.org/stable/c/1a7cf828ed861de5be1aff99e10f114b363c19d3 git.kernel.org: https://git.kernel.org/stable/c/9d3211cb61a0773a2440d0a0698c1e6e7429f907 git.kernel.org: https://git.kernel.org/stable/c/4b4317b0d758ff92ba96f4e448a8992a6fe607bf git.kernel.org: https://git.kernel.org/stable/c/89fdac333a17ed990b41565630ef4791782e02f5 git.kernel.org: https://git.kernel.org/stable/c/9b05e91afe948ed819bf87d7ba0fccf451ed79a6 git.kernel.org: https://git.kernel.org/stable/c/31d0599a23efdbfe579bfbd1eb8f8c942f13744d git.kernel.org: https://git.kernel.org/stable/c/ac53f377393cc85156afdc90b636e84e544a6f96 git.kernel.org: https://git.kernel.org/stable/c/59f7d2138591ef8f0e4e4ab5f1ab674e8181ad3a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html