vulnerability
Ubuntu: (CVE-2025-38187): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:N/I:C/A:C) | Jul 4, 2025 | Jul 9, 2025 | Nov 20, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()
The RPC container is released after being passed to r535_gsp_rpc_send().
When sending the initial fragment of a large RPC and passing the
caller's RPC container, the container will be freed prematurely. Subsequent
attempts to send remaining fragments will therefore result in a
use-after-free.
Allocate a temporary RPC container for holding the initial fragment of a
large RPC when sending. Free the caller's container when all fragments
are successfully sent.
[ Rebase onto Blackwell changes. - Danilo ]
Solution
References
- CVE-2025-38187
- https://attackerkb.com/topics/CVE-2025-38187
- CWE-416
- URL-https://git.kernel.org/linus/9802f0a63b641f4cddb2139c814c2e95cb825099
- URL-https://git.kernel.org/stable/c/9802f0a63b641f4cddb2139c814c2e95cb825099
- URL-https://git.kernel.org/stable/c/cd4677407c0ee250fc21e36439c8a442ddd62cc1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-38187
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.