CVE-2025-37867

Source
https://cve.org/CVERecord?id=CVE-2025-37867
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37867.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37867
Downstream
Related
Published
2025-05-09T06:43:56.749Z
Modified
2026-03-20T12:42:31.727954Z
Summary
RDMA/core: Silence oversized kvmalloc() warning
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Silence oversized kvmalloc() warning

syzkaller triggered an oversized kvmalloc() warning. Silence it by adding _GFPNOWARN.

syzkaller log: WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmallocnodenoprof+0x175/0x180 CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+ #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:__kvmallocnodenoprof+0x175/0x180 RSP: 0018:ffffc90001e67c10 EFLAGS: 00010246 RAX: 0000000000000100 RBX: 0000000000000400 RCX: ffffffff8149d46b RDX: 0000000000000000 RSI: ffff8881030fae80 RDI: 0000000000000002 RBP: 000000712c800000 R08: 0000000000000100 R09: 0000000000000000 R10: ffffc90001e67c10 R11: 0030ae0601000000 R12: 0000000000000000 R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000 FS: 00007fde79159740(0000) GS:ffff88813bdc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 0000000105eb4005 CR4: 00000000003706b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ibumemodpget+0x1f6/0x390 mlx5ibregusermr+0x1e8/0x450 ibuverbsregmr+0x28b/0x440 ibuverbswrite+0x7d3/0xa30 vfswrite+0x1ac/0x6c0 ksyswrite+0x134/0x170 ? _sanitizercovtracepc+0x1c/0x50 dosyscall64+0x50/0x110 entrySYSCALL64afterhwframe+0x76/0x7e

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37867.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
37824952dc8fcd96e5c5a1ce9abf3f0ba09b1e5e
Fixed
f94ac90ce7bd6f9266ad0d99044ed86e8d1416c1
Fixed
791daf8240cedf27af8794038ae1d32ef643bce6
Fixed
6c588e9afbab240c921f936cb676dac72e2e2b66
Fixed
ae470d06320dea4002d441784d691f0a26b4322d
Fixed
0d81bb58a203ad5f4044dc18cfbc230c194f650a
Fixed
f476eba25fdf70faa7b19a3e0fb00e65c5b53106
Fixed
9a0e6f15029e1a8a21e40f06fd05aa52b7f063de

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37867.json"