Skip to main content

CVE-2025-37771: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37771cvecve-2025-37771
Published: Thu May 01 2025 (05/01/2025, 13:07:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 07/03/2025, 23:10:42 UTC

Technical Analysis

CVE-2025-37771 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD graphics (drm/amd/pm). The flaw arises from improper handling of a user-controlled speed parameter. The vulnerability allows a user to set an arbitrary speed value, and if this value exceeds UINT_MAX/8 (where UINT_MAX is the maximum value for an unsigned integer), it can lead to a division by zero error. This division by zero can cause a kernel panic or system crash, resulting in a denial of service (DoS) condition. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE). The affected versions are identified by a specific commit hash, indicating the flaw was present in certain Linux kernel builds prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue is rooted in the power management code for AMD GPUs, which is critical for managing device performance and stability. Because the flaw is triggered by user input, it could potentially be exploited by a local unprivileged user or a malicious process to disrupt system availability. However, exploitation requires the ability to interact with the DRM AMD power management interface, which may require certain privileges or access to the graphics subsystem. The vulnerability highlights the importance of input validation in kernel modules, especially those handling hardware parameters. The patch would involve adding checks to ensure the speed value does not exceed safe thresholds to prevent division by zero.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD graphics hardware that utilize the affected DRM power management code. The impact is mainly a denial of service, where attackers could cause system crashes or reboots, disrupting business operations, especially in environments relying on Linux servers or workstations with AMD GPUs. This could affect sectors such as finance, manufacturing, research, and public services where Linux is prevalent. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be leveraged in multi-tenant environments or shared systems to degrade service availability. Organizations using AMD GPUs in critical infrastructure or high-performance computing clusters may face operational interruptions. Additionally, the lack of known exploits suggests a window of opportunity for attackers once the vulnerability becomes widely known. The impact on confidentiality and integrity is minimal, but availability is significantly affected. European organizations with strict uptime requirements or those operating in regulated industries may face compliance and operational risks if systems are affected.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should promptly apply the Linux kernel patches once they are released by the Linux maintainers or their Linux distribution vendors. Until patches are available, organizations should restrict access to systems with AMD GPUs to trusted users only and monitor for unusual activity related to the DRM subsystem. System administrators can consider disabling or limiting access to the AMD DRM power management features if feasible, or use kernel parameters to restrict user control over GPU speed settings. Implementing strict access controls and auditing user interactions with GPU management interfaces can help detect and prevent exploitation attempts. Additionally, organizations should maintain up-to-date kernel versions and subscribe to security advisories from Linux distributions to ensure timely patching. Testing patches in staging environments before deployment is recommended to avoid unintended disruptions. For environments where AMD GPUs are critical, consider deploying redundancy and failover mechanisms to minimize downtime in case of exploitation. Finally, educating users and administrators about the risks of running untrusted code or commands that interact with kernel modules can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.939Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe83a6

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 7/3/2025, 11:10:42 PM

Last updated: 8/15/2025, 8:39:12 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats