Skip to main content

CVE-2025-37951: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37951cvecve-2025-37951
Published: Tue May 20 2025 (05/20/2025, 16:01:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Add job to pending list if the reset was skipped When a CL/CSD job times out, we check if the GPU has made any progress since the last timeout. If so, instead of resetting the hardware, we skip the reset and let the timer get rearmed. This gives long-running jobs a chance to complete. However, when `timedout_job()` is called, the job in question is removed from the pending list, which means it won't be automatically freed through `free_job()`. Consequently, when we skip the reset and keep the job running, the job won't be freed when it finally completes. This situation leads to a memory leak, as exposed in [1] and [2]. Similarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when GPU is still active"), this patch ensures the job is put back on the pending list when extending the timeout.

AI-Powered Analysis

AILast updated: 07/03/2025, 18:55:29 UTC

Technical Analysis

CVE-2025-37951 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the v3d driver responsible for managing GPU jobs. The issue arises when a command list (CL) or command stream decoder (CSD) job times out. Normally, the system checks if the GPU has made progress since the last timeout; if progress is detected, the kernel skips resetting the hardware to allow long-running jobs to complete. However, the vulnerability occurs because the timed-out job is removed from the pending job list when the timeout handler is invoked. Since the job is no longer on the pending list, it is not automatically freed upon completion, leading to a memory leak. This leak can cause resource exhaustion over time, potentially degrading system performance or causing instability. The patch to fix this vulnerability involves re-adding the job to the pending list when the timeout is extended, ensuring proper cleanup and resource management. This flaw does not appear to allow direct code execution or privilege escalation but can impact system reliability and availability due to resource leakage. No known exploits are reported in the wild as of the publication date, and the affected Linux kernel versions are identified by specific commit hashes rather than version numbers, indicating this is a recent and targeted fix in the kernel source code.

Potential Impact

For European organizations, the primary impact of CVE-2025-37951 lies in potential degradation of system stability and availability on Linux systems utilizing the affected DRM v3d driver, which is commonly found in devices using Broadcom VideoCore GPUs (e.g., Raspberry Pi and similar ARM-based platforms). Organizations relying on such hardware for embedded systems, IoT devices, or specialized computing tasks may experience memory leaks leading to performance issues or system crashes if the vulnerability is exploited or triggered by workloads with long-running GPU jobs. While this vulnerability does not directly compromise confidentiality or integrity, the availability impact can disrupt critical services, especially in industrial, telecommunications, or research environments where Linux-based embedded devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational failures. European sectors with high reliance on embedded Linux systems, such as manufacturing automation, smart city infrastructure, and scientific computing, should be particularly vigilant.

Mitigation Recommendations

To mitigate CVE-2025-37951, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available, ensuring that the DRM v3d driver correctly manages job lists and memory. 2) For embedded or specialized devices where kernel updates are less frequent, consider implementing monitoring tools to track GPU job memory usage and detect abnormal leaks or system instability early. 3) Limit the execution of long-running GPU jobs or implement workload scheduling policies that reduce the likelihood of timeouts triggering the vulnerable code path. 4) Engage with hardware and software vendors to confirm the presence of the patch in device firmware or kernel versions and request updates if necessary. 5) Incorporate this vulnerability into vulnerability management and patching workflows, prioritizing affected systems in asset inventories that use the v3d driver or similar GPU management components. 6) Conduct thorough testing after patch application to ensure system stability and performance are maintained.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.973Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeae79

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/3/2025, 6:55:29 PM

Last updated: 8/21/2025, 5:41:04 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats