Home / Companies / GitHub / Blog / Post Details
Content Deep Dive

Bypassing MTE with CVE-2025-0072

Blog post from GitHub

Post Details
Company
Date Published
Author
Man Yue Mo
Word Count
2,495
Language
English
Hacker News Points
-
Summary

Memory Tagging Extension (MTE) is a security feature designed to prevent memory corruption vulnerabilities, yet recent exploits like CVE-2025-0072 reveal its limitations. This vulnerability, found in ARM's Mali GPU driver, allows a malicious Android app to bypass MTE and execute arbitrary kernel code, affecting devices such as Google's Pixel series. The exploit leverages the Command Stream Frontend (CSF) architecture, manipulating command queues to create a use-after-free scenario, which enables access to freed memory pages. Despite MTE’s hardware-level protections, the exploit bypasses them by accessing freed pages through user space mappings rather than kernel dereferencing, a more common attack vector. The flaw was addressed in a May 2025 update, highlighting ongoing challenges in ensuring memory safety even with advanced features like MTE.