Skip to main content

CVE-2025-37867: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37867cvecve-2025-37867
Published: Fri May 09 2025 (05/09/2025, 06:43:56 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Silence oversized kvmalloc() warning syzkaller triggered an oversized kvmalloc() warning. Silence it by adding __GFP_NOWARN. syzkaller log: WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmalloc_node_noprof+0x175/0x180 CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+ #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:__kvmalloc_node_noprof+0x175/0x180 RSP: 0018:ffffc90001e67c10 EFLAGS: 00010246 RAX: 0000000000000100 RBX: 0000000000000400 RCX: ffffffff8149d46b RDX: 0000000000000000 RSI: ffff8881030fae80 RDI: 0000000000000002 RBP: 000000712c800000 R08: 0000000000000100 R09: 0000000000000000 R10: ffffc90001e67c10 R11: 0030ae0601000000 R12: 0000000000000000 R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000 FS: 00007fde79159740(0000) GS:ffff88813bdc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 0000000105eb4005 CR4: 00000000003706b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ib_umem_odp_get+0x1f6/0x390 mlx5_ib_reg_user_mr+0x1e8/0x450 ib_uverbs_reg_mr+0x28b/0x440 ib_uverbs_write+0x7d3/0xa30 vfs_write+0x1ac/0x6c0 ksys_write+0x134/0x170 ? __sanitizer_cov_trace_pc+0x1c/0x50 do_syscall_64+0x50/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e

AI-Powered Analysis

AILast updated: 07/04/2025, 00:41:30 UTC

Technical Analysis

CVE-2025-37867 is a vulnerability identified in the Linux kernel, specifically related to the RDMA (Remote Direct Memory Access) core subsystem. The issue arises from an oversized kvmalloc() warning triggered during kernel memory allocation operations. The vulnerability was discovered through syzkaller, a kernel fuzzing tool, which generated a warning at the __kvmalloc_node_noprof function in the mm/util.c file. The root cause involves the handling of memory allocation requests that exceed expected sizes, leading to warnings that could indicate improper memory management or potential for denial of service conditions. The vulnerability is linked to the ib_umem_odp_get and mlx5_ib_reg_user_mr functions, which are part of the InfiniBand and RDMA user memory registration processes. These functions are critical for managing user memory regions in RDMA operations, and improper handling could lead to resource exhaustion or kernel instability. The patch to address this issue involves silencing the oversized kvmalloc() warning by adding the __GFP_NOWARN flag, which suppresses the warning rather than directly fixing a memory corruption or overflow. This suggests the vulnerability is more about preventing noisy warnings that could be exploited or cause operational issues rather than a direct exploit leading to privilege escalation or code execution. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected Linux kernel versions are identified by a specific commit hash, indicating this is a recent and targeted fix in the kernel source code. The vulnerability does not require user interaction but does involve kernel-level operations, implying that exploitation would require local access or a process capable of invoking RDMA-related kernel calls.

Potential Impact

For European organizations, the impact of CVE-2025-37867 primarily concerns systems utilizing RDMA technology, which is common in high-performance computing, data centers, and enterprise environments requiring low-latency networking. Potential impacts include kernel instability or denial of service due to improper memory allocation warnings, which could disrupt critical services relying on Linux servers. While there is no evidence of privilege escalation or remote code execution, the vulnerability could be leveraged by an attacker with local access to degrade system performance or cause crashes, impacting availability. Organizations in sectors such as finance, telecommunications, research institutions, and cloud service providers that deploy Linux servers with RDMA capabilities are at higher risk. The absence of known exploits reduces immediate threat levels, but the presence of this vulnerability in kernel memory management highlights the need for vigilance. Additionally, the suppression of warnings rather than a direct fix may mask underlying issues, potentially complicating troubleshooting and incident response efforts.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2025-37867. Specifically, kernel versions incorporating the commit that adds the __GFP_NOWARN flag to silence the oversized kvmalloc() warning should be deployed. System administrators should audit their environments to identify servers utilizing RDMA features, particularly those running InfiniBand or Mellanox mlx5 drivers, and ensure these systems are patched promptly. Monitoring kernel logs for unusual kvmalloc warnings or memory allocation anomalies can help detect attempts to exploit or trigger this vulnerability. Additionally, restricting local access to trusted users and processes, implementing strict access controls, and employing kernel hardening techniques can reduce the risk of exploitation. For environments where immediate patching is not feasible, disabling RDMA features temporarily or isolating affected systems may mitigate potential impacts. Coordination with Linux distribution vendors for backported patches and security advisories is recommended to maintain up-to-date protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.959Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7d34

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/4/2025, 12:41:30 AM

Last updated: 8/15/2025, 4:23:32 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats