{"vulnerability": "CVE-2025-37766", "sightings": [{"uuid": "53ff45b0-2eb3-4e40-abb8-0d72ef8eb6c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37766", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ff359fcfac284f38ca78751ddb9767e2", "content": "", "creation_timestamp": "2025-08-28T17:43:45.000000Z"}, {"uuid": "5079c3b1-e76f-4246-b230-f34dc315bd7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37766\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Prevent division by zero\n\nThe user can set any speed value.\nIf speed is greater than UINT_MAX/8, division by zero is possible.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\ud83d\udccf Published: 2025-05-01T13:07:07.168Z\n\ud83d\udccf Modified: 2025-05-02T06:16:14.896Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6b9f9b998b107c7539f148a013d789ddb860c3b9\n2. https://git.kernel.org/stable/c/ce773dd844ee19a605af27f11470887e0f2044a9\n3. https://git.kernel.org/stable/c/80814924260cea431a8fc6137d11cc8cb331a10c\n4. https://git.kernel.org/stable/c/ffd688804425579a472fbd2525bedb58b1d28bd9\n5. https://git.kernel.org/stable/c/068091b796480819bf70b159f17e222ad8bea900\n6. https://git.kernel.org/stable/c/42f7b5d12c28b2a601a98d10a80c6db1fe1a2900\n7. https://git.kernel.org/stable/c/affd2241927a1e74c0aecd50c2d920dc4213c56d\n8. https://git.kernel.org/stable/c/4e3d9508c056d7e0a56b58d5c81253e2a0d22b6c", "creation_timestamp": "2025-05-02T07:16:37.000000Z"}]}