Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (occ) Fix division by zero in occ_show_power_1() In occ_show_power_1() case 1, the accumulator is divided by update_tag without checking for zero. If no samples have been collected yet (e.g. during early boot when the sensor block is included but hasn't been updated), update_tag is zero, causing a kernel divide-by-zero crash. The 2019 fix in commit 211186cae14d ("hwmon: (occ) Fix division by zero issue") only addressed occ_get_powr_avg() used by occ_show_power_2() and occ_show_power_a0(). This separate code path in occ_show_power_1() was missed. Fix this by reusing the existing occ_get_powr_avg() helper, which already handles the zero-sample case and uses mul_u64_u32_div() to multiply before dividing for better precision. Move the helper above occ_show_power_1() so it is visible at the call site. [groeck: Fix alignment problems reported by checkpatch]
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.0, < 5.10.253 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/243d55bd3f08cb15eee9d63f4716d4d4cdd760f5Patch
- https://git.kernel.org/stable/c/2502684b9e835de9a992ec47c3e6c6faabe3858dPatch
- https://git.kernel.org/stable/c/37ae8fadc74ed68e5bc364ffd17746d88e449ae3Patch
- https://git.kernel.org/stable/c/39e2a5bf970402a8530a319cf06122e216ba57b8Patch
- https://git.kernel.org/stable/c/53e6175756b8c474b6247bbcea0aad3d68357475Patch
- https://git.kernel.org/stable/c/7b89ce0c98bf3015f493ca4285b2d1056cd8c733Patch
- https://git.kernel.org/stable/c/bbbefc48f6617cfb738dcff7f44beb50b5dfeb38Patch
- https://git.kernel.org/stable/c/c7d3712362c8ab8f82f441b649d9e446e7b9aa9dPatch
FAQ
What is CVE-2026-31770?
CVE-2026-31770 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: hwmon: (occ) Fix division by zero in occ_show_power_1() In occ_show_power_1() case 1, the accumulator is divided by update_tag wit...
How severe is CVE-2026-31770?
CVE-2026-31770 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31770?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.