{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-58408","assignerOrgId":"367425dc-4d06-4041-9650-c2dc6aaa27ce","state":"PUBLISHED","assignerShortName":"imaginationtech","dateReserved":"2025-09-01T08:00:07.349Z","datePublished":"2025-12-01T11:16:24.598Z","dateUpdated":"2025-12-01T18:06:18.597Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["Linux","Android"],"product":"Graphics DDK","vendor":"Imagination Technologies","versions":[{"status":"affected","version":"1.15 RTM","versionType":"custom"},{"status":"affected","version":"1.17 RTM","versionType":"custom"},{"status":"affected","version":"1.18 RTM","versionType":"custom"},{"lessThanOrEqual":"25.2 RTM2","status":"affected","version":"23.2 RTM","versionType":"custom"},{"status":"unaffected","version":"25.3 RTM","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free.<br><br>The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.<br>"}],"value":"Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free.\n\nThe Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use."}],"impacts":[{"capecId":"CAPEC-124","descriptions":[{"lang":"en","value":"CAPEC - CAPEC-124: Shared Resource Manipulation (Version 3.9)"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-416","description":"CWE - CWE-416: Use After Free (4.18)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"367425dc-4d06-4041-9650-c2dc6aaa27ce","shortName":"imaginationtech","dateUpdated":"2025-12-01T11:16:24.598Z"},"references":[{"url":"https://www.imaginationtech.com/gpu-driver-vulnerabilities/"}],"source":{"discovery":"UNKNOWN"},"title":"GPU DDK - KASAN Read UAF in the PVRSRVBridgeRGXSubmitTransfer2 due to improper error handling code","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.9,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-12-01T18:06:06.234397Z","id":"CVE-2025-58408","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-01T18:06:18.597Z"}}]}}