CVE-2025-21990: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags PRT BOs may not have any backing store, so bo->tbo.resource will be NULL. Check for that before dereferencing. (cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)
AI Analysis
Technical Summary
CVE-2025-21990 is a vulnerability identified in the Linux kernel specifically within the AMDGPU driver component responsible for managing graphics memory. The issue arises in the handling of buffer objects (BOs) related to the Graphics Core Next (GCN) architecture, particularly the GFX12 Page Table Entry (PTE) flags. The vulnerability is due to a missing NULL check on the backing store of a buffer object (bo->tbo.resource) before dereferencing it. In certain cases, PRT (Page Request Table) BOs may not have any backing store, resulting in a NULL pointer. If the kernel attempts to dereference this NULL pointer, it can lead to undefined behavior such as kernel crashes or memory corruption. This flaw was addressed by adding a proper NULL check to ensure the backing store exists before accessing it, preventing potential faults. Although the vulnerability does not currently have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel versions identified by the commit hash 0cce5f285d9ae81c33993f3270fe77f5e74a69ab. The vulnerability is technical and low-level, impacting the stability and security of the Linux kernel's graphics subsystem, which is critical for systems using AMD GPUs. The fix was cherry-picked from a specific commit, indicating it was backported to stable kernel branches.
Potential Impact
For European organizations, the impact of CVE-2025-21990 primarily concerns systems running Linux with AMD GPU hardware, especially in environments where graphics processing is critical, such as data centers, cloud providers, research institutions, and enterprises using Linux-based workstations. Exploitation could lead to kernel crashes causing denial of service (DoS), potentially disrupting operations and availability of services. In worst cases, memory corruption might be leveraged for privilege escalation or arbitrary code execution, although no such exploits are currently known. This could compromise confidentiality and integrity of systems if exploited. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could face operational risks. Additionally, sectors relying on GPU-accelerated computing (e.g., scientific research, AI development) may experience service interruptions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a core kernel component necessitates prompt attention to avoid future exploitation as attackers develop techniques.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2025-21990. Specifically, they should: 1) Identify all systems using AMD GPUs running vulnerable Linux kernel versions (matching the commit hash or earlier). 2) Apply vendor-provided kernel updates or patches that incorporate the NULL check fix. 3) For environments where immediate patching is challenging, consider temporary mitigations such as disabling AMDGPU driver modules if feasible, or restricting access to vulnerable systems to trusted users only. 4) Monitor kernel logs and system stability for signs of crashes or anomalies related to graphics memory management. 5) Implement strict access controls and system hardening to reduce the risk of privilege escalation attempts leveraging this vulnerability. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and verify patch deployment. 7) Incorporate this vulnerability into vulnerability management and incident response workflows to ensure ongoing awareness and remediation tracking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-21990: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags PRT BOs may not have any backing store, so bo->tbo.resource will be NULL. Check for that before dereferencing. (cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)
AI-Powered Analysis
Technical Analysis
CVE-2025-21990 is a vulnerability identified in the Linux kernel specifically within the AMDGPU driver component responsible for managing graphics memory. The issue arises in the handling of buffer objects (BOs) related to the Graphics Core Next (GCN) architecture, particularly the GFX12 Page Table Entry (PTE) flags. The vulnerability is due to a missing NULL check on the backing store of a buffer object (bo->tbo.resource) before dereferencing it. In certain cases, PRT (Page Request Table) BOs may not have any backing store, resulting in a NULL pointer. If the kernel attempts to dereference this NULL pointer, it can lead to undefined behavior such as kernel crashes or memory corruption. This flaw was addressed by adding a proper NULL check to ensure the backing store exists before accessing it, preventing potential faults. Although the vulnerability does not currently have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel versions identified by the commit hash 0cce5f285d9ae81c33993f3270fe77f5e74a69ab. The vulnerability is technical and low-level, impacting the stability and security of the Linux kernel's graphics subsystem, which is critical for systems using AMD GPUs. The fix was cherry-picked from a specific commit, indicating it was backported to stable kernel branches.
Potential Impact
For European organizations, the impact of CVE-2025-21990 primarily concerns systems running Linux with AMD GPU hardware, especially in environments where graphics processing is critical, such as data centers, cloud providers, research institutions, and enterprises using Linux-based workstations. Exploitation could lead to kernel crashes causing denial of service (DoS), potentially disrupting operations and availability of services. In worst cases, memory corruption might be leveraged for privilege escalation or arbitrary code execution, although no such exploits are currently known. This could compromise confidentiality and integrity of systems if exploited. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could face operational risks. Additionally, sectors relying on GPU-accelerated computing (e.g., scientific research, AI development) may experience service interruptions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a core kernel component necessitates prompt attention to avoid future exploitation as attackers develop techniques.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2025-21990. Specifically, they should: 1) Identify all systems using AMD GPUs running vulnerable Linux kernel versions (matching the commit hash or earlier). 2) Apply vendor-provided kernel updates or patches that incorporate the NULL check fix. 3) For environments where immediate patching is challenging, consider temporary mitigations such as disabling AMDGPU driver modules if feasible, or restricting access to vulnerable systems to trusted users only. 4) Monitor kernel logs and system stability for signs of crashes or anomalies related to graphics memory management. 5) Implement strict access controls and system hardening to reduce the risk of privilege escalation attempts leveraging this vulnerability. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and verify patch deployment. 7) Incorporate this vulnerability into vulnerability management and incident response workflows to ensure ongoing awareness and remediation tracking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.800Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8e62
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 11:41:05 AM
Last updated: 8/1/2025, 12:32:04 AM
Views: 18
Related Threats
CVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.