CVE-2025-38187

Source
https://cve.org/CVERecord?id=CVE-2025-38187
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38187.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38187
Downstream
Related
Published
2025-07-04T13:37:13.126Z
Modified
2026-03-20T12:42:43.527164Z
Summary
drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix a use-after-free in r535gsprpc_push()

The RPC container is released after being passed to r535gsprpc_send().

When sending the initial fragment of a large RPC and passing the caller's RPC container, the container will be freed prematurely. Subsequent attempts to send remaining fragments will therefore result in a use-after-free.

Allocate a temporary RPC container for holding the initial fragment of a large RPC when sending. Free the caller's container when all fragments are successfully sent.

[ Rebase onto Blackwell changes. - Danilo ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38187.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
176fdcbddfd288408ce8571c1760ad618d962096
Fixed
cd4677407c0ee250fc21e36439c8a442ddd62cc1
Fixed
9802f0a63b641f4cddb2139c814c2e95cb825099

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38187.json"