Skip to main content

CVE-2025-37767: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37767cvecve-2025-37767
Published: Thu May 01 2025 (05/01/2025, 13:07:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:57:15 UTC

Technical Analysis

CVE-2025-37767 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) AMD power management (pm) component. The flaw arises due to improper handling of a user-controlled speed parameter. The vulnerability allows a user to set any speed value, and if this value exceeds UINT_MAX/8, it triggers a division by zero error. This can lead to undefined behavior in the kernel, potentially causing a system crash (kernel panic) or other stability issues. The root cause is a lack of validation on the speed parameter before performing arithmetic operations, which is a classic example of insufficient input validation leading to a runtime error. The vulnerability was discovered by the Linux Verification Center using the SVACE static analysis tool and has been publicly disclosed and patched as of May 1, 2025. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The affected versions correspond to specific Linux kernel commits identified by their hashes, indicating that the issue is present in certain recent kernel builds prior to the patch.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with AMD DRM power management enabled. The impact includes potential denial of service due to kernel crashes triggered by malicious or malformed inputs controlling the speed parameter. This can disrupt critical services, especially in environments relying on Linux servers, embedded devices, or workstations with AMD GPUs. While the vulnerability does not directly indicate privilege escalation or remote code execution, the resulting system instability can be exploited by attackers to cause outages or force reboots, impacting availability. Organizations in sectors such as finance, telecommunications, manufacturing, and public infrastructure that depend on Linux-based systems could experience operational disruptions. Additionally, the vulnerability might be leveraged as part of a multi-stage attack to degrade system reliability or evade detection by causing unexpected crashes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately apply the official Linux kernel patches that address CVE-2025-37767 once available. 2) Audit and upgrade all Linux systems, especially those with AMD GPUs and DRM enabled, to patched kernel versions. 3) Implement strict input validation and monitoring on user-space applications or services that interact with kernel DRM interfaces to prevent injection of malicious speed values. 4) Employ kernel crash monitoring and automated recovery mechanisms to minimize downtime in case of unexpected crashes. 5) Restrict unprivileged user access to interfaces that allow setting speed parameters or interacting with DRM components. 6) Maintain up-to-date inventories of Linux kernel versions in use to ensure timely patch deployment. 7) Consider deploying kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) to reduce exploitation risk. 8) Monitor security advisories from Linux kernel maintainers and AMD for any updates or exploit reports related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.939Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe8396

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 10:57:15 PM

Last updated: 8/8/2025, 10:01:10 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats