CVE-2025-37767
📋 TL;DR
A division by zero vulnerability exists in the AMD GPU power management driver (drm/amd/pm) in the Linux kernel. Attackers can trigger a kernel panic or system crash by setting specific speed values. This affects Linux systems with AMD graphics hardware using vulnerable kernel versions.
💻 Affected Systems
- Linux kernel with AMD GPU driver (drm/amd/pm)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.
Likely Case
System crash or kernel panic requiring reboot, resulting in temporary denial of service.
If Mitigated
No impact if patched or if speed values are validated before reaching vulnerable code.
🎯 Exploit Status
Exploitation requires ability to set GPU speed values, typically requiring local access and appropriate permissions. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fixes from the provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/327107bd7f052f4ee2d0c966c7ae879822f1814f
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Reboot system to load new kernel. 3. Verify AMD GPU driver is functioning correctly.
🔧 Temporary Workarounds
Disable AMD GPU power management
linuxPrevent loading of the vulnerable drm/amd/pm module
echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot
Restrict GPU speed setting permissions
linuxLimit access to GPU control interfaces
chmod 600 /sys/class/drm/card*/device/pp_*
chown root:root /sys/class/drm/card*/device/pp_*
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable kernels
- Implement strict access controls on GPU management interfaces
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if AMD GPU driver is loaded: 'uname -r' and 'lsmod | grep amdgpu'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and system remains stable when GPU operations are performed
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- AMD GPU driver crash logs
- System reboot events without clear cause
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "division by zero") AND "amdgpu"
🔗 References
- https://git.kernel.org/stable/c/327107bd7f052f4ee2d0c966c7ae879822f1814f
- https://git.kernel.org/stable/c/8f7b5987e21e003cafac28f0e4d323e6496f83ba
- https://git.kernel.org/stable/c/c3ff73e3bddf1a6c30d7effe4018d12ba0cadd2e
- https://git.kernel.org/stable/c/f23e9116ebb71b63fe9cec0dcac792aa9af30b0c
- https://git.kernel.org/stable/c/f2904fa2b9da943db6bef7c0f8b3fb4fc14acbc4
- https://git.kernel.org/stable/c/fb803d4bb9ea0a61c21c4987505e4d4ae18f9fdc
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html