In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix a use-after-free in r535gsprpc_push()
The RPC container is released after being passed to r535gsprpc_send().
When sending the initial fragment of a large RPC and passing the caller's RPC container, the container will be freed prematurely. Subsequent attempts to send remaining fragments will therefore result in a use-after-free.
Allocate a temporary RPC container for holding the initial fragment of a large RPC when sending. Free the caller's container when all fragments are successfully sent.
[ Rebase onto Blackwell changes. - Danilo ]
[
{
"target": {
"file": "drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c",
"function": "r535_gsp_rpc_push"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-38187-65a8123f",
"deprecated": false,
"digest": {
"length": 1193.0,
"function_hash": "302799180269589382864106227395964719439"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9802f0a63b641f4cddb2139c814c2e95cb825099"
},
{
"target": {
"file": "drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c",
"function": "r535_gsp_rpc_push"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2025-38187-8d135473",
"deprecated": false,
"digest": {
"length": 1193.0,
"function_hash": "302799180269589382864106227395964719439"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd4677407c0ee250fc21e36439c8a442ddd62cc1"
},
{
"target": {
"file": "drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c"
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-38187-90bcadd0",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"313905064198155412557348614138021951582",
"91929028905955704004277443161885988700",
"125393504417766830661036149551553324337",
"306062951106131457483703903993707769440",
"185813110761874356187480891931806872631",
"219837748237914477569601115066977566482",
"91871855134638869568330214760006316796",
"70860937405214819094747918406680977577",
"47798268099994756258492657734632882828",
"39543813591935705357146940056431709505",
"49841533522368945834558263647772118906",
"99599289535472046074332958291934321743",
"120161459148413086182060852323580012587",
"123593775704724429332144278337962112972",
"52147674713334586431634824839495518119"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd4677407c0ee250fc21e36439c8a442ddd62cc1"
},
{
"target": {
"file": "drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c"
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2025-38187-a3beb3ce",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"313905064198155412557348614138021951582",
"91929028905955704004277443161885988700",
"125393504417766830661036149551553324337",
"306062951106131457483703903993707769440",
"185813110761874356187480891931806872631",
"219837748237914477569601115066977566482",
"91871855134638869568330214760006316796",
"70860937405214819094747918406680977577",
"47798268099994756258492657734632882828",
"39543813591935705357146940056431709505",
"49841533522368945834558263647772118906",
"99599289535472046074332958291934321743",
"120161459148413086182060852323580012587",
"123593775704724429332144278337962112972",
"52147674713334586431634824839495518119"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9802f0a63b641f4cddb2139c814c2e95cb825099"
}
]