Skip to main content

CVE-2025-21990: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21990cvecve-2025-21990
Published: Wed Apr 02 2025 (04/02/2025, 12:53:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags PRT BOs may not have any backing store, so bo->tbo.resource will be NULL. Check for that before dereferencing. (cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)

AI-Powered Analysis

AILast updated: 06/30/2025, 11:41:05 UTC

Technical Analysis

CVE-2025-21990 is a vulnerability identified in the Linux kernel specifically within the AMDGPU driver component responsible for managing graphics memory. The issue arises in the handling of buffer objects (BOs) related to the Graphics Core Next (GCN) architecture, particularly the GFX12 Page Table Entry (PTE) flags. The vulnerability is due to a missing NULL check on the backing store of a buffer object (bo->tbo.resource) before dereferencing it. In certain cases, PRT (Page Request Table) BOs may not have any backing store, resulting in a NULL pointer. If the kernel attempts to dereference this NULL pointer, it can lead to undefined behavior such as kernel crashes or memory corruption. This flaw was addressed by adding a proper NULL check to ensure the backing store exists before accessing it, preventing potential faults. Although the vulnerability does not currently have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel versions identified by the commit hash 0cce5f285d9ae81c33993f3270fe77f5e74a69ab. The vulnerability is technical and low-level, impacting the stability and security of the Linux kernel's graphics subsystem, which is critical for systems using AMD GPUs. The fix was cherry-picked from a specific commit, indicating it was backported to stable kernel branches.

Potential Impact

For European organizations, the impact of CVE-2025-21990 primarily concerns systems running Linux with AMD GPU hardware, especially in environments where graphics processing is critical, such as data centers, cloud providers, research institutions, and enterprises using Linux-based workstations. Exploitation could lead to kernel crashes causing denial of service (DoS), potentially disrupting operations and availability of services. In worst cases, memory corruption might be leveraged for privilege escalation or arbitrary code execution, although no such exploits are currently known. This could compromise confidentiality and integrity of systems if exploited. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could face operational risks. Additionally, sectors relying on GPU-accelerated computing (e.g., scientific research, AI development) may experience service interruptions. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a core kernel component necessitates prompt attention to avoid future exploitation as attackers develop techniques.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2025-21990. Specifically, they should: 1) Identify all systems using AMD GPUs running vulnerable Linux kernel versions (matching the commit hash or earlier). 2) Apply vendor-provided kernel updates or patches that incorporate the NULL check fix. 3) For environments where immediate patching is challenging, consider temporary mitigations such as disabling AMDGPU driver modules if feasible, or restricting access to vulnerable systems to trusted users only. 4) Monitor kernel logs and system stability for signs of crashes or anomalies related to graphics memory management. 5) Implement strict access controls and system hardening to reduce the risk of privilege escalation attempts leveraging this vulnerability. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and verify patch deployment. 7) Incorporate this vulnerability into vulnerability management and incident response workflows to ensure ongoing awareness and remediation tracking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.800Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9833c4522896dcbe8e62

Added to database: 5/21/2025, 9:09:07 AM

Last enriched: 6/30/2025, 11:41:05 AM

Last updated: 8/1/2025, 12:32:04 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats