CVE-2025-37951: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Add job to pending list if the reset was skipped When a CL/CSD job times out, we check if the GPU has made any progress since the last timeout. If so, instead of resetting the hardware, we skip the reset and let the timer get rearmed. This gives long-running jobs a chance to complete. However, when `timedout_job()` is called, the job in question is removed from the pending list, which means it won't be automatically freed through `free_job()`. Consequently, when we skip the reset and keep the job running, the job won't be freed when it finally completes. This situation leads to a memory leak, as exposed in [1] and [2]. Similarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when GPU is still active"), this patch ensures the job is put back on the pending list when extending the timeout.
AI Analysis
Technical Summary
CVE-2025-37951 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the v3d driver responsible for managing GPU jobs. The issue arises when a command list (CL) or command stream decoder (CSD) job times out. Normally, the system checks if the GPU has made progress since the last timeout; if progress is detected, the kernel skips resetting the hardware to allow long-running jobs to complete. However, the vulnerability occurs because the timed-out job is removed from the pending job list when the timeout handler is invoked. Since the job is no longer on the pending list, it is not automatically freed upon completion, leading to a memory leak. This leak can cause resource exhaustion over time, potentially degrading system performance or causing instability. The patch to fix this vulnerability involves re-adding the job to the pending list when the timeout is extended, ensuring proper cleanup and resource management. This flaw does not appear to allow direct code execution or privilege escalation but can impact system reliability and availability due to resource leakage. No known exploits are reported in the wild as of the publication date, and the affected Linux kernel versions are identified by specific commit hashes rather than version numbers, indicating this is a recent and targeted fix in the kernel source code.
Potential Impact
For European organizations, the primary impact of CVE-2025-37951 lies in potential degradation of system stability and availability on Linux systems utilizing the affected DRM v3d driver, which is commonly found in devices using Broadcom VideoCore GPUs (e.g., Raspberry Pi and similar ARM-based platforms). Organizations relying on such hardware for embedded systems, IoT devices, or specialized computing tasks may experience memory leaks leading to performance issues or system crashes if the vulnerability is exploited or triggered by workloads with long-running GPU jobs. While this vulnerability does not directly compromise confidentiality or integrity, the availability impact can disrupt critical services, especially in industrial, telecommunications, or research environments where Linux-based embedded devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational failures. European sectors with high reliance on embedded Linux systems, such as manufacturing automation, smart city infrastructure, and scientific computing, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2025-37951, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available, ensuring that the DRM v3d driver correctly manages job lists and memory. 2) For embedded or specialized devices where kernel updates are less frequent, consider implementing monitoring tools to track GPU job memory usage and detect abnormal leaks or system instability early. 3) Limit the execution of long-running GPU jobs or implement workload scheduling policies that reduce the likelihood of timeouts triggering the vulnerable code path. 4) Engage with hardware and software vendors to confirm the presence of the patch in device firmware or kernel versions and request updates if necessary. 5) Incorporate this vulnerability into vulnerability management and patching workflows, prioritizing affected systems in asset inventories that use the v3d driver or similar GPU management components. 6) Conduct thorough testing after patch application to ensure system stability and performance are maintained.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland
CVE-2025-37951: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Add job to pending list if the reset was skipped When a CL/CSD job times out, we check if the GPU has made any progress since the last timeout. If so, instead of resetting the hardware, we skip the reset and let the timer get rearmed. This gives long-running jobs a chance to complete. However, when `timedout_job()` is called, the job in question is removed from the pending list, which means it won't be automatically freed through `free_job()`. Consequently, when we skip the reset and keep the job running, the job won't be freed when it finally completes. This situation leads to a memory leak, as exposed in [1] and [2]. Similarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when GPU is still active"), this patch ensures the job is put back on the pending list when extending the timeout.
AI-Powered Analysis
Technical Analysis
CVE-2025-37951 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the v3d driver responsible for managing GPU jobs. The issue arises when a command list (CL) or command stream decoder (CSD) job times out. Normally, the system checks if the GPU has made progress since the last timeout; if progress is detected, the kernel skips resetting the hardware to allow long-running jobs to complete. However, the vulnerability occurs because the timed-out job is removed from the pending job list when the timeout handler is invoked. Since the job is no longer on the pending list, it is not automatically freed upon completion, leading to a memory leak. This leak can cause resource exhaustion over time, potentially degrading system performance or causing instability. The patch to fix this vulnerability involves re-adding the job to the pending list when the timeout is extended, ensuring proper cleanup and resource management. This flaw does not appear to allow direct code execution or privilege escalation but can impact system reliability and availability due to resource leakage. No known exploits are reported in the wild as of the publication date, and the affected Linux kernel versions are identified by specific commit hashes rather than version numbers, indicating this is a recent and targeted fix in the kernel source code.
Potential Impact
For European organizations, the primary impact of CVE-2025-37951 lies in potential degradation of system stability and availability on Linux systems utilizing the affected DRM v3d driver, which is commonly found in devices using Broadcom VideoCore GPUs (e.g., Raspberry Pi and similar ARM-based platforms). Organizations relying on such hardware for embedded systems, IoT devices, or specialized computing tasks may experience memory leaks leading to performance issues or system crashes if the vulnerability is exploited or triggered by workloads with long-running GPU jobs. While this vulnerability does not directly compromise confidentiality or integrity, the availability impact can disrupt critical services, especially in industrial, telecommunications, or research environments where Linux-based embedded devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational failures. European sectors with high reliance on embedded Linux systems, such as manufacturing automation, smart city infrastructure, and scientific computing, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2025-37951, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available, ensuring that the DRM v3d driver correctly manages job lists and memory. 2) For embedded or specialized devices where kernel updates are less frequent, consider implementing monitoring tools to track GPU job memory usage and detect abnormal leaks or system instability early. 3) Limit the execution of long-running GPU jobs or implement workload scheduling policies that reduce the likelihood of timeouts triggering the vulnerable code path. 4) Engage with hardware and software vendors to confirm the presence of the patch in device firmware or kernel versions and request updates if necessary. 5) Incorporate this vulnerability into vulnerability management and patching workflows, prioritizing affected systems in asset inventories that use the v3d driver or similar GPU management components. 6) Conduct thorough testing after patch application to ensure system stability and performance are maintained.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.973Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeae79
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/3/2025, 6:55:29 PM
Last updated: 8/21/2025, 5:41:04 PM
Views: 21
Related Threats
CVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.