Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-21968 |
CWE-ID | CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU106629
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21968
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hdcp_destroy() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_hdcp.c. A local user can escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.10 - 6.13.7
CPE2.3https://git.kernel.org/stable/c/378b361e2e30e9729f9a7676f7926868d14f4326
https://git.kernel.org/stable/c/4964dbc4191ab436877a5e3ecd9c67a4e50b7c36
https://git.kernel.org/stable/c/93d701064e56788663d7c5918fbe5e060d5df587
https://git.kernel.org/stable/c/bac7b8b1a3f1a86eeec85835af106cbdc2b9d9f7
https://git.kernel.org/stable/c/e65e7bea220c3ce8c4c793b4ba35557f4994ab2b
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.236
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.180
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.132
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.20
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.84
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.