SB20250502148 - Use-after-free in Linux kernel drm nouveau driver
Published: May 2, 2025 Updated: May 10, 2025
Security Bulletin ID
SB20250502148
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-37765)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nouveau_gem_object_del() function in drivers/gpu/drm/nouveau/nouveau_gem.c, within the nouveau_bo_del_ttm() function in drivers/gpu/drm/nouveau/nouveau_bo.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/12b038d521c75e3521522503becf3bc162628469
- https://git.kernel.org/stable/c/31e94c7989572f96926673614a3b958915a13ca9
- https://git.kernel.org/stable/c/47761deabb69a5df0c2c4ec400d80bb3e072bd2e
- https://git.kernel.org/stable/c/6b95947ee780f4e1fb26413a1437d05bcb99712b
- https://git.kernel.org/stable/c/6e2c805996a49998d31ac522beb1534ca417e761
- https://git.kernel.org/stable/c/706868a1a1072cffd8bd63f7e161d79141099849
- https://git.kernel.org/stable/c/8ec0fbb28d049273bfd4f1e7a5ae4c74884beed3
- https://git.kernel.org/stable/c/ada78110b2d3ec88b398a49703bd336d4cee7a08
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.181