VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68170

CVE-2025-68170

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Do not kfree() devres managed rdev

Since the allocation of the drivers main structure was changed to devm_drm_dev_alloc() rdev is managed by devres and we shouldn't be calling kfree() on it.

This fixes things exploding if the driver probe fails and devres cleans up the rdev after we already free'd it.

(cherry picked from commit 16c0681617b8a045773d4d87b6140002fa75b03b)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in the Linux kernel's radeon driver occurs when devres-managed rdev is freed with kfree() during a failed probe.

Vulnerability

Overview

In the Linux kernel's drm/radeon driver, a use-after-free vulnerability exists due to improper memory management. The driver's main structure (rdev) was previously allocated with devm_drm_dev_alloc(), which makes it managed by devres (device resource management). However, the error path in the driver still called kfree() on this devres-managed pointer, leading to a double-free or use-after-free condition when the probe fails and devres subsequently attempts to clean up the already freed rdev [1].

Exploitation

Scenario

This bug is triggered during a driver probe failure. An attacker would need to cause the radeon driver to fail its initialization sequence, for a Radeon GPU device. This could be achieved through hardware misconfiguration, incompatible configurations or by inducing resource allocation failures. No special privileges are required beyond the ability to load the driver, which typically happens at boot or when a GPU device is hotplugged.

Impact

If triggered, the kernel may crash or behave unpredictably due to memory corruption. An attacker who can control the probe failure conditions could potentially exploit this to escalate privileges or cause a denial of service. The vulnerability is local and requires physical or administrative access to the system to trigger the driver probe.

Mitigation

The fix is included in Linux kernel commit 16c0681617b8 and its stable backport f7482516002a. The patch removes the erroneous kfree() call, allowing devres to properly manage the rdev lifetime. Users should update their kernel to a version containing this fix. No workarounds are available; the affected driver is part of the kernel and cannot be easily disabled without losing Radeon GPU support.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.