Skip to main content

CVE-2025-37764: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37764cvecve-2025-37764
Published: Thu May 01 2025 (05/01/2025, 13:07:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/imagination: fix firmware memory leaks Free the memory used to hold the results of firmware image processing when the module is unloaded. Fix the related issue of the same memory being leaked if processing of the firmware image fails during module load. Ensure all firmware GEM objects are destroyed if firmware image processing fails. Fixes memory leaks on powervr module unload detected by Kmemleak: unreferenced object 0xffff000042e20000 (size 94208): comm "modprobe", pid 470, jiffies 4295277154 hex dump (first 32 bytes): 02 ae 7f ed bf 45 84 00 3c 5b 1f ed 9f 45 45 05 .....E..<[...EE. d5 4f 5d 14 6c 00 3d 23 30 d0 3a 4a 66 0e 48 c8 .O].l.=#0.:Jf.H. backtrace (crc dd329dec): kmemleak_alloc+0x30/0x40 ___kmalloc_large_node+0x140/0x188 __kmalloc_large_node_noprof+0x2c/0x13c __kmalloc_noprof+0x48/0x4c0 pvr_fw_init+0xaa4/0x1f50 [powervr] unreferenced object 0xffff000042d20000 (size 20480): comm "modprobe", pid 470, jiffies 4295277154 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 09 00 00 00 0b 00 00 00 ................ 00 00 00 00 00 00 00 00 07 00 00 00 08 00 00 00 ................ backtrace (crc 395b02e3): kmemleak_alloc+0x30/0x40 ___kmalloc_large_node+0x140/0x188 __kmalloc_large_node_noprof+0x2c/0x13c __kmalloc_noprof+0x48/0x4c0 pvr_fw_init+0xb0c/0x1f50 [powervr]

AI-Powered Analysis

AILast updated: 07/03/2025, 22:56:09 UTC

Technical Analysis

CVE-2025-37764 addresses a memory leak vulnerability in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the Imagination Technologies PowerVR (powervr) graphics driver module. The issue arises from improper handling of firmware image processing during module load and unload operations. When the powervr kernel module is unloaded, the memory allocated to hold the results of firmware image processing was not properly freed, leading to persistent memory leaks. Additionally, if the firmware image processing fails during module load, the allocated firmware GEM (Graphics Execution Manager) objects were not destroyed, causing further memory leaks. These leaks were detected by the kernel memory leak detector (kmemleak), with unreferenced objects of significant size (e.g., 94,208 bytes and 20,480 bytes) remaining allocated after module unload or failed load attempts. The vulnerability is rooted in the pvr_fw_init function within the powervr driver, which allocates memory without ensuring its release under failure or unload conditions. The fix involves explicitly freeing all allocated memory related to firmware image processing and destroying all GEM objects if processing fails, thereby preventing memory leaks. This vulnerability affects specific Linux kernel versions identified by the commit hash cc1aeedb98ad347c06ff59e991b2f94dfb4c565d. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Memory leaks in kernel modules can lead to gradual depletion of system memory, potentially causing degraded performance, system slowdowns, or crashes, especially on systems heavily utilizing the powervr graphics driver. This can affect servers, workstations, or embedded devices running affected Linux kernel versions with powervr support. Organizations relying on Linux-based infrastructure with powervr hardware or software components may experience increased downtime or require more frequent reboots to mitigate memory exhaustion. While this vulnerability does not directly enable privilege escalation or remote code execution, the resulting denial of service through resource exhaustion could disrupt critical services. European sectors with high dependency on Linux systems for graphics processing, such as telecommunications, automotive, industrial control, and media production, could be more affected. Additionally, embedded systems in IoT or specialized hardware using powervr GPUs may be vulnerable to stability issues. The absence of known exploits reduces immediate risk, but unpatched systems remain susceptible to potential future exploitation or operational disruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for CVE-2025-37764. Specifically, ensure that the kernel version includes the commit cc1aeedb98ad347c06ff59e991b2f94dfb4c565d or later. For environments where immediate patching is not feasible, organizations should monitor system memory usage closely on devices using the powervr driver and schedule regular maintenance windows to reboot affected systems to clear leaked memory. Additionally, auditing the use of powervr modules and disabling or unloading them on systems where they are not required can reduce exposure. For embedded or specialized devices, coordinate with hardware vendors to obtain firmware or kernel updates incorporating the fix. Implementing kernel memory leak detection tools like kmemleak in testing environments can help identify residual leaks and verify patch effectiveness. Finally, maintain robust system monitoring and alerting to detect abnormal memory consumption patterns indicative of this vulnerability being triggered.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.938Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe838a

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 10:56:09 PM

Last updated: 7/31/2025, 8:00:46 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats