Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free.
The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.
References
Configurations
No configuration.
History
01 Dec 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
01 Dec 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-01 12:15
Updated : 2025-12-01 18:16
NVD link : CVE-2025-58408
Mitre link : CVE-2025-58408
CVE.ORG link : CVE-2025-58408
JSON object : View
Products Affected
No product.
CWE
CWE-416
Use After Free
