CVE-2025-0427

7.8 HIGH

📋 TL;DR

A Use After Free vulnerability in Arm GPU kernel drivers allows local non-privileged users to access freed memory through GPU processing operations. This affects multiple Arm GPU architectures (Bifrost, Valhall, 5th Gen) across specific driver versions. Attackers could potentially escalate privileges or cause system instability.

💻 Affected Systems

Products:
  • Arm Ltd Bifrost GPU Kernel Driver
  • Arm Ltd Valhall GPU Kernel Driver
  • Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver
Versions: Bifrost: r8p0 through r49p3, r50p0 through r51p0; Valhall: r19p0 through r49p3, r50p0 through r53p0; 5th Gen: r41p0 through r49p3, r50p0 through r53p0
Operating Systems: Linux-based systems with affected Arm GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using Arm Mali GPUs with vulnerable driver versions. Requires local user access to GPU processing capabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level access, allowing full system compromise, data theft, or persistent malware installation.

🟠

Likely Case

Local privilege escalation enabling unauthorized access to sensitive data or system resources, potentially leading to lateral movement.

🟢

If Mitigated

Limited impact if proper access controls and isolation prevent local user execution, though system instability may still occur.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Local users can exploit this vulnerability, making it dangerous in multi-user environments or if attackers gain initial access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of GPU memory management and driver internals. Local access needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Arm advisory for specific fixed versions beyond affected ranges

Vendor Advisory: https://developer.arm.com/documentation/110465/latest/

Restart Required: Yes

Instructions:

1. Review Arm advisory for fixed driver versions. 2. Update GPU kernel drivers to patched versions. 3. Reboot system to load new drivers. 4. Verify driver version post-update.

🔧 Temporary Workarounds

Restrict GPU access

linux

Limit non-privileged user access to GPU processing capabilities

# Use device permissions or cgroups to restrict GPU device access
# Example: chmod 600 /dev/mali0
# Configure appropriate cgroup policies for GPU devices

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from executing GPU operations
  • Isolate systems with vulnerable drivers from untrusted users and network segments

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against affected ranges: cat /sys/class/misc/mali0/device/driver/version or similar driver version file

Check Version:

cat /sys/class/misc/mali0/device/driver/version 2>/dev/null || dmesg | grep -i mali

Verify Fix Applied:

Verify driver version is outside affected ranges after update

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops or panic messages related to GPU driver
  • Unusual GPU memory allocation patterns
  • Failed GPU operations with memory access errors

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("mali" OR "gpu") AND ("panic" OR "oops" OR "use after free")

🔗 References

📤 Share & Export