NVD Published Date: 09/08/2025
NVD Last Modified: 09/08/2025
Preface: The Mali kernel driver and userspace libraries are found in different locations depending on whether the system is Android or a general Linux distribution, and also based on the specific Mali GPU generation and the SoC vendor’s implementation.
Background: Mali GPU is a hardware accelerator.
- It does not run an OS itself.
- It relies on kernel-space and user-space drivers (like the Mali kernel driver and userspace libraries) to interface with the operating system (Linux, Android, etc.).
ioctl
(Input/Output Control) is the primary syscall used by userspace GPU drivers to communicate with the kernel-space driver. It allows sending custom commands and structured data to the driver.
Typical ioctl
operations in Mali drivers include:
MALI_IOCTL_ALLOC_MEM
: Allocate GPU-accessible memoryMALI_IOCTL_FREE_MEM
: Free previously allocated memoryMALI_IOCTL_SUBMIT_JOB
: Submit a GPU job (e.g., shader execution)MALI_IOCTL_WAIT_JOB
: Wait for job completionMALI_IOCTL_MAP_MEM
: Map memory to userspace
Vulnerability details: CVE-2025-3212 is a vulnerability in the kernel driver that interfaces with the Mali GPU. Here’s what that means:
- The vulnerability is in software, not the hardware.
- It allows a local non-privileged user to exploit the driver to access freed memory, which could contain sensitive data or allow privilege escalation.
- The Mali GPU hardware itself is not “vulnerable” in the sense of having a flaw — but it becomes a vector for exploitation because of the flawed driver.
Official announcement: Please refer to the link for details – https://developer.arm.com/documentation/110627/1-0/