-
CVE-2025-38187
- EPSS 0.03%
- Published 04.07.2025 13:37:13
- Last modified 08.07.2025 16:18:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push() The RPC container is released after being passed to r535_gsp_rpc_send(). When sending the initial fragment of a large RPC and passing the caller's RPC container, the container will be freed prematurely. Subsequent attempts to send remaining fragments will therefore result in a use-after-free. Allocate a temporary RPC container for holding the initial fragment of a large RPC when sending. Free the caller's container when all fragments are successfully sent. [ Rebase onto Blackwell changes. - Danilo ]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
cd4677407c0ee250fc21e36439c8a442ddd62cc1
Version
176fdcbddfd288408ce8571c1760ad618d962096
Status
affected
Version <
9802f0a63b641f4cddb2139c814c2e95cb825099
Version
176fdcbddfd288408ce8571c1760ad618d962096
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.7
Status
affected
Version <
6.7
Version
0
Status
unaffected
Version <=
6.15.*
Version
6.15.4
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.083 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|