Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37867
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-09 May, 2025 | 06:43
Updated At-03 Nov, 2025 | 19:56
Rejected At-
▼CVE Numbering Authority (CNA)
RDMA/core: Silence oversized kvmalloc() warning

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Silence oversized kvmalloc() warning syzkaller triggered an oversized kvmalloc() warning. Silence it by adding __GFP_NOWARN. syzkaller log: WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmalloc_node_noprof+0x175/0x180 CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+ #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:__kvmalloc_node_noprof+0x175/0x180 RSP: 0018:ffffc90001e67c10 EFLAGS: 00010246 RAX: 0000000000000100 RBX: 0000000000000400 RCX: ffffffff8149d46b RDX: 0000000000000000 RSI: ffff8881030fae80 RDI: 0000000000000002 RBP: 000000712c800000 R08: 0000000000000100 R09: 0000000000000000 R10: ffffc90001e67c10 R11: 0030ae0601000000 R12: 0000000000000000 R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000 FS: 00007fde79159740(0000) GS:ffff88813bdc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 0000000105eb4005 CR4: 00000000003706b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ib_umem_odp_get+0x1f6/0x390 mlx5_ib_reg_user_mr+0x1e8/0x450 ib_uverbs_reg_mr+0x28b/0x440 ib_uverbs_write+0x7d3/0xa30 vfs_write+0x1ac/0x6c0 ksys_write+0x134/0x170 ? __sanitizer_cov_trace_pc+0x1c/0x50 do_syscall_64+0x50/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/infiniband/core/umem_odp.c
Default Status
unaffected
Versions
Affected
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before f94ac90ce7bd6f9266ad0d99044ed86e8d1416c1 (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before 791daf8240cedf27af8794038ae1d32ef643bce6 (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before 6c588e9afbab240c921f936cb676dac72e2e2b66 (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before ae470d06320dea4002d441784d691f0a26b4322d (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before 0d81bb58a203ad5f4044dc18cfbc230c194f650a (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before f476eba25fdf70faa7b19a3e0fb00e65c5b53106 (git)
  • From 37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e before 9a0e6f15029e1a8a21e40f06fd05aa52b7f063de (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/infiniband/core/umem_odp.c
Default Status
affected
Versions
Affected
  • 5.4
Unaffected
  • From 0 before 5.4 (semver)
  • From 5.10.237 through 5.10.* (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.25 through 6.12.* (semver)
  • From 6.14.4 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f94ac90ce7bd6f9266ad0d99044ed86e8d1416c1
N/A
https://git.kernel.org/stable/c/791daf8240cedf27af8794038ae1d32ef643bce6
N/A
https://git.kernel.org/stable/c/6c588e9afbab240c921f936cb676dac72e2e2b66
N/A
https://git.kernel.org/stable/c/ae470d06320dea4002d441784d691f0a26b4322d
N/A
https://git.kernel.org/stable/c/0d81bb58a203ad5f4044dc18cfbc230c194f650a
N/A
https://git.kernel.org/stable/c/f476eba25fdf70faa7b19a3e0fb00e65c5b53106
N/A
https://git.kernel.org/stable/c/9a0e6f15029e1a8a21e40f06fd05aa52b7f063de
N/A
Hyperlink: https://git.kernel.org/stable/c/f94ac90ce7bd6f9266ad0d99044ed86e8d1416c1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/791daf8240cedf27af8794038ae1d32ef643bce6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6c588e9afbab240c921f936cb676dac72e2e2b66
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ae470d06320dea4002d441784d691f0a26b4322d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0d81bb58a203ad5f4044dc18cfbc230c194f650a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f476eba25fdf70faa7b19a3e0fb00e65c5b53106
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9a0e6f15029e1a8a21e40f06fd05aa52b7f063de
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found