Oops! It's a Kernel Stack Use-After-Free: Exploiting NVIDIA's GPU Linux Drivers
An Anonymous Coward writes:
This article details two bugs discovered in the NVIDIA Linux Open GPU Kernel Modules and demonstrates how they can be exploited. The bugs can be triggered by an attacker controlling a local unprivileged process. Their security implications were confirmed via a proof of concept that achieves kernel read and write primitives.
Back in 2022, NVIDIA started distributing the Linux Open GPU Kernel Modules. Since 2024, using these modules is officially "the right move" for both consumer and server hardware. The driver provides multiple kernel modules, the bugs being found in nvidia.ko and nvidia-uvm.ko. They expose ioctls on device files, most of them being accessible to unprivileged users. These ioctls are meant to be used by NVIDIA's proprietary userland binaries and libraries. However, using the header files provided in the kernel modules repository as a basis, it's possible to make direct ioctl calls.
While manually probing the attack surface related to memory allocation and management we found two vulnerabilities. They were reported to NVIDIA and the vendor issued fixes in their NVIDIA GPU Display Drivers update of October 2025
https://blog.quarkslab.com/nvidia_gpu_kernel_vmalloc_exploit.html
[Ed. note: if you've ever wondered about the nitty-gritty details of exploits, TFA breaks down these use-after-free exploits and show how they work]
Read more of this story at SoylentNews.