Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: hibmcge: fix the division by zero issue When the network port is down, the queue is released, and ring->len is 0. In debugfs, hbg_get_queue_used_num() will be called, which may lead to a division by zero issue. This patch adds a check, if ring->len is 0, hbg_get_queue_used_num() directly returns 0.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-04 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

40735e7543f94fc88f58d94fd5f88daa4a2f2c6e (git) before c945e1ad4f3b77166a3215dabc0c6c980d4a9c73
affected

40735e7543f94fc88f58d94fd5f88daa4a2f2c6e (git) before 475e06113c615dafd44262d6d6bd37786f7f4206
affected

40735e7543f94fc88f58d94fd5f88daa4a2f2c6e (git) before 7004b26f0b64331143eb0b312e77a357a11427ce
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/c945e1ad4f3b77166a3215dabc0c6c980d4a9c73

git.kernel.org/...c/475e06113c615dafd44262d6d6bd37786f7f4206

git.kernel.org/...c/7004b26f0b64331143eb0b312e77a357a11427ce

cve.org (CVE-2025-38719)

nvd.nist.gov (CVE-2025-38719)

Download JSON