{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:51:12.808","vulnerabilities":[{"cve":{"id":"CVE-2025-0427","sourceIdentifier":"arm-security@arm.com","published":"2025-05-02T10:15:16.637","lastModified":"2025-05-12T16:15:21.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r8p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r19p0 through r49p3, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p3, from r50p0 through r53p0."},{"lang":"es","value":"La vulnerabilidad \"Use After Free\" en los controladores del kernel de GPU Bifrost de Arm Ltd, Valhall de Arm Ltd y Arm 5th Gen GPU Architecture Kernel Driver de Arm Ltd permite que un proceso de usuario local sin privilegios realice operaciones de procesamiento de GPU válidas para obtener acceso a memoria ya liberada. Este problema afecta a los controladores del kernel de GPU Bifrost: de r8p0 a r49p3 y de r50p0 a r51p0; Valhall de Arm Ltd: de r19p0 a r49p3 y de r50p0 a r53p0; Arm 5th Gen GPU Architecture Kernel Driver de Arm Ltd: de r41p0 a r49p3 y de r50p0 a r53p0."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"arm-security@arm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-416"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r41p0","versionEndIncluding":"r49p3","matchCriteriaId":"8ACF6697-A7EB-4131-937C-AC3A1FB49923"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r50p0","versionEndIncluding":"r53p0","matchCriteriaId":"20FA69E1-1B9E-423E-859D-D47526D843DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r8p0","versionEndIncluding":"r49p3","matchCriteriaId":"36C94DD7-49EE-46ED-9ECB-09CE22FAD3FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r50p0","versionEndIncluding":"r51p0","matchCriteriaId":"D3439BB1-431A-4480-ADA5-23F4A680659F"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r19p0","versionEndIncluding":"r49p3","matchCriteriaId":"75B9241A-E748-4CAD-B08D-311A9C6BC9A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r50p0","versionEndIncluding":"r53p0","matchCriteriaId":"5CF9F3C4-CF1F-4A2B-B6C9-2CA9F8658B84"}]}]}],"references":[{"url":"https://developer.arm.com/documentation/110465/latest/","source":"arm-security@arm.com","tags":["Vendor Advisory"]}]}}]}