Home

Description

Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free. The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.

PUBLISHED Reserved 2025-09-01 | Published 2025-12-01 | Updated 2025-12-01 | Assigner imaginationtech

Problem types

CWE - CWE-416: Use After Free (4.18)

Product status

Default status
unknown

1.15 RTM (custom)
affected

1.17 RTM (custom)
affected

1.18 RTM (custom)
affected

23.2 RTM (custom)
affected

25.3 RTM (custom)
unaffected

References

www.imaginationtech.com/gpu-driver-vulnerabilities/

cve.org (CVE-2025-58408)

nvd.nist.gov (CVE-2025-58408)

Download JSON