EUVD-2025-16639

| CVE-2025-0073 HIGH
2025-06-02 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 16:47 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:47 euvd
EUVD-2025-16639
CVE Published
Jun 02, 2025 - 11:15 nvd
HIGH 7.8

Description

Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0.

Analysis

Use After Free (UAF) vulnerability in Arm Ltd's Valhall GPU Kernel Driver and Arm 5th Gen GPU Architecture Kernel Driver that allows a local, unprivileged user to access already-freed GPU memory through improper GPU memory processing operations. Affected versions range from r53p0 before r54p0 in both driver families. With a CVSS score of 7.8 and high impact across confidentiality, integrity, and availability, this vulnerability enables memory disclosure, data manipulation, and potential denial of service on systems running vulnerable GPU drivers.

Technical Context

This vulnerability exists in the GPU kernel driver layer responsible for managing GPU memory operations and allocation/deallocation routines. The root cause is classified as CWE-416 (Use After Free), a memory safety issue where freed GPU memory objects are accessed after their deallocation without proper reference counting or state validation. In GPU drivers, this typically occurs when: (1) GPU memory is deallocated but pointers remain in driver structures, (2) GPU command streams reference memory without validity checks, or (3) asynchronous GPU operations complete after memory is freed. The affected components are the Valhall GPU Kernel Driver (r53p0-r53pX) and Arm 5th Gen GPU Architecture Kernel Driver (r53p0-r53pX), both critical components in Mali GPU stacks used in mobile SoCs. The vulnerability affects the GPU memory management subsystem responsible for handling user-space memory allocation requests through ioctl interfaces.

Affected Products

Valhall GPU Kernel Driver (r53p0 through r53pX (before r54p0)); Arm 5th Gen GPU Architecture Kernel Driver (r53p0 through r53pX (before r54p0))

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

EUVD-2025-16639 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy