CVE-2025-37771
📋 TL;DR
A division by zero vulnerability exists in the AMD GPU power management driver (drm/amd/pm) in the Linux kernel. This occurs when users set speed values greater than UINT_MAX/8, potentially causing kernel crashes or denial of service. Systems with AMD GPUs running vulnerable Linux kernel versions are affected.
💻 Affected Systems
- Linux kernel with AMD GPU driver (drm/amd/pm)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.
Likely Case
System instability, GPU driver crashes, or application failures when specific speed values are set.
If Mitigated
Minor performance impact from patched validation checks, with no security impact.
🎯 Exploit Status
Exploitation requires local access and ability to set specific GPU speed values; not trivial but feasible for knowledgeable users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 402964994e8e, 509617407411, 6413fed01620, 7d641c2b8327, b7c41df49137
Vendor Advisory: https://git.kernel.org/stable/c/402964994e8ece29702383b234fabcf04791ff95
Restart Required: Yes
Instructions:
1. Update Linux kernel to a version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify GPU driver functionality post-update.
🔧 Temporary Workarounds
Restrict GPU speed setting access
linuxLimit user permissions to modify GPU speed parameters via system permissions or SELinux/AppArmor policies.
chmod 600 /sys/class/drm/card*/device/pp_dpm_sclk
chmod 600 /sys/class/drm/card*/device/pp_dpm_mclk
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from modifying GPU speed settings.
- Monitor system logs for GPU driver crashes or unusual speed parameter changes.
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if AMD GPU driver is loaded: 'lsmod | grep amdgpu' and 'uname -r' to compare with patched versions.
Check Version:
uname -r
Verify Fix Applied:
After update, verify kernel version includes fix commits and test setting GPU speed values within normal ranges.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- GPU driver crash logs in dmesg
- System instability reports
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="dmesg" AND "divide error" OR "kernel panic" AND "amdgpu"
🔗 References
- https://git.kernel.org/stable/c/402964994e8ece29702383b234fabcf04791ff95
- https://git.kernel.org/stable/c/5096174074114f83c700a27869c54362cbb10f3e
- https://git.kernel.org/stable/c/6413fed016208171592c88b5df002af8a1387e24
- https://git.kernel.org/stable/c/7d641c2b83275d3b0424127b2e0d2d0f7dd82aef
- https://git.kernel.org/stable/c/b7c41df4913789ebfe73cc1e17c6401d4c5eab69
- https://git.kernel.org/stable/c/baa54adb5e0599299b8f088efb5544d876a3eb62
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html