CVE-2025-58408Use After Free in Technologies Graphics DDK

CWE-416Use After Free2 documents2 sources
Severity
5.9MEDIUMNVD
EPSS
0.0%
top 93.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 1

Description

Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free. The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.5 | Impact: 3.4

Affected Packages2 packages

CVEListV5imagination_technologies/graphics_ddk23.2 RTM25.2 RTM2+3

🔴Vulnerability Details

1
GHSA
GHSA-3cjf-7xfg-396f: Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel excep2025-12-01