CVE-2025-37768: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Analysis
Technical Summary
CVE-2025-37768 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) AMD power management (pm) component. The flaw arises from improper handling of a user-controlled speed parameter. The vulnerability allows a user to set any speed value, and if this value exceeds UINT_MAX divided by 8, it can trigger a division by zero error. This occurs because the code does not properly validate or constrain the speed input before performing arithmetic operations, leading to a potential runtime exception or kernel panic. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE). The affected component is critical for managing AMD GPU power states, and the flaw could be exploited by a local user with the ability to interact with the DRM subsystem. Although no known exploits are currently reported in the wild, the vulnerability could lead to denial of service (DoS) conditions by crashing the kernel or causing system instability. The affected versions correspond to a specific Linux kernel commit hash, indicating that the issue is present in recent kernel builds prior to the patch. No CVSS score has been assigned yet, and no official patch links are provided, but the vulnerability is publicly disclosed as of May 1, 2025.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD GPU hardware where the DRM AMD power management driver is active. The impact is mainly a denial of service through kernel crashes or system instability, which can disrupt critical services, especially in environments relying on Linux servers or workstations with AMD GPUs for graphics or compute tasks. Confidentiality and integrity impacts are minimal as the flaw does not directly allow privilege escalation or data leakage. However, availability could be significantly affected, particularly in sectors such as finance, manufacturing, or research institutions that use Linux-based infrastructure with AMD GPUs. The risk is heightened in multi-user or shared environments where untrusted users might exploit this flaw to cause service interruptions. Given the lack of known exploits, the threat is currently theoretical but could be weaponized once exploit code becomes available.
Mitigation Recommendations
Organizations should promptly identify Linux systems running AMD GPUs and verify the kernel versions against the affected commit hashes. Applying the latest Linux kernel updates that include the fix for this vulnerability is the most effective mitigation. Until patches are applied, restricting unprivileged user access to the DRM subsystem can reduce exploitation risk. This can be done by adjusting permissions on /dev/dri devices or using kernel lockdown features to limit direct hardware access. Monitoring system logs for unusual kernel errors or crashes related to DRM or AMD GPU drivers can help detect attempted exploitation. Additionally, organizations should implement robust system integrity monitoring and maintain up-to-date backups to recover quickly from potential DoS incidents. For environments where AMD GPU power management is not essential, disabling the affected DRM AMD pm module could be considered as a temporary workaround.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-37768: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI-Powered Analysis
Technical Analysis
CVE-2025-37768 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) AMD power management (pm) component. The flaw arises from improper handling of a user-controlled speed parameter. The vulnerability allows a user to set any speed value, and if this value exceeds UINT_MAX divided by 8, it can trigger a division by zero error. This occurs because the code does not properly validate or constrain the speed input before performing arithmetic operations, leading to a potential runtime exception or kernel panic. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE). The affected component is critical for managing AMD GPU power states, and the flaw could be exploited by a local user with the ability to interact with the DRM subsystem. Although no known exploits are currently reported in the wild, the vulnerability could lead to denial of service (DoS) conditions by crashing the kernel or causing system instability. The affected versions correspond to a specific Linux kernel commit hash, indicating that the issue is present in recent kernel builds prior to the patch. No CVSS score has been assigned yet, and no official patch links are provided, but the vulnerability is publicly disclosed as of May 1, 2025.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD GPU hardware where the DRM AMD power management driver is active. The impact is mainly a denial of service through kernel crashes or system instability, which can disrupt critical services, especially in environments relying on Linux servers or workstations with AMD GPUs for graphics or compute tasks. Confidentiality and integrity impacts are minimal as the flaw does not directly allow privilege escalation or data leakage. However, availability could be significantly affected, particularly in sectors such as finance, manufacturing, or research institutions that use Linux-based infrastructure with AMD GPUs. The risk is heightened in multi-user or shared environments where untrusted users might exploit this flaw to cause service interruptions. Given the lack of known exploits, the threat is currently theoretical but could be weaponized once exploit code becomes available.
Mitigation Recommendations
Organizations should promptly identify Linux systems running AMD GPUs and verify the kernel versions against the affected commit hashes. Applying the latest Linux kernel updates that include the fix for this vulnerability is the most effective mitigation. Until patches are applied, restricting unprivileged user access to the DRM subsystem can reduce exploitation risk. This can be done by adjusting permissions on /dev/dri devices or using kernel lockdown features to limit direct hardware access. Monitoring system logs for unusual kernel errors or crashes related to DRM or AMD GPU drivers can help detect attempted exploitation. Additionally, organizations should implement robust system integrity monitoring and maintain up-to-date backups to recover quickly from potential DoS incidents. For environments where AMD GPU power management is not essential, disabling the affected DRM AMD pm module could be considered as a temporary workaround.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.939Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe839a
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 10:57:35 PM
Last updated: 8/13/2025, 11:29:52 AM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.