Use-after-free in Linux kernel display amdgpu_dm driver



| Updated: 2025-05-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-21968
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU106629

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21968

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hdcp_destroy() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_hdcp.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.10 - 6.13.7

CPE2.3 External links

https://git.kernel.org/stable/c/378b361e2e30e9729f9a7676f7926868d14f4326
https://git.kernel.org/stable/c/4964dbc4191ab436877a5e3ecd9c67a4e50b7c36
https://git.kernel.org/stable/c/93d701064e56788663d7c5918fbe5e060d5df587
https://git.kernel.org/stable/c/bac7b8b1a3f1a86eeec85835af106cbdc2b9d9f7
https://git.kernel.org/stable/c/e65e7bea220c3ce8c4c793b4ba35557f4994ab2b
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.236
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.180
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.132
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.20
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.84


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###