{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-3212","assignerOrgId":"56a131ea-b967-4a0d-a41e-5f3549952846","state":"PUBLISHED","assignerShortName":"Arm","dateReserved":"2025-04-03T13:08:45.728Z","datePublished":"2025-09-08T12:53:44.984Z","dateUpdated":"2026-02-26T17:49:08.682Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Bifrost GPU Kernel Driver","vendor":"Arm Ltd","versions":[{"lessThanOrEqual":"r49p4","status":"affected","version":"r41p0","versionType":"patch"},{"changes":[{"at":"r54p1","status":"unaffected"}],"lessThanOrEqual":"r51p0","status":"affected","version":"r50p0","versionType":"patch"}]},{"defaultStatus":"unaffected","product":"Valhall GPU Kernel Driver","vendor":"Arm Ltd","versions":[{"lessThanOrEqual":"r49p4","status":"affected","version":"r41p0","versionType":"patch"},{"changes":[{"at":"r54p1","status":"unaffected"}],"lessThanOrEqual":"r54p0","status":"affected","version":"r50p0","versionType":"patch"}]},{"defaultStatus":"unaffected","product":"Arm 5th Gen GPU Architecture Kernel Driver","vendor":"Arm Ltd","versions":[{"lessThanOrEqual":"r49p4","status":"affected","version":"r41p0","versionType":"patch"},{"changes":[{"at":"r54p1","status":"unaffected"}],"lessThanOrEqual":"r54p0","status":"affected","version":"r50p0","versionType":"patch"}]}],"datePublic":"2025-09-02T12:50:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.<p>This issue affects Bifrost GPU Kernel Driver: from r41p0 through r49p4, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.</p>"}],"value":"Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r49p4, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-416","description":"CWE-416 Use After Free","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"56a131ea-b967-4a0d-a41e-5f3549952846","shortName":"Arm","dateUpdated":"2025-09-08T12:53:44.984Z"},"references":[{"url":"https://developer.arm.com/documentation/110627/latest"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue has been fixed in the following versions: Bifrost GPU Kernel Driver r54p1; Valhall GPU Kernel Driver r54p1; Arm 5th Gen GPU Architecture Kernel Driver r54p1.<br>Arm partners are recommended to upgrade to use the latest applicable version as soon as possible.<br>"}],"value":"This issue has been fixed in the following versions: Bifrost GPU Kernel Driver r54p1; Valhall GPU Kernel Driver r54p1; Arm 5th Gen GPU Architecture Kernel Driver r54p1.\nArm partners are recommended to upgrade to use the latest applicable version as soon as possible."}],"source":{"discovery":"UNKNOWN"},"title":"Mali GPU Kernel Driver allows access to already freed memory","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-3212","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-09-09T03:55:20.373550Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:49:08.682Z"}}]}}