5.5
CVE-2023-4211
- EPSS 0.05%
- Published 01.10.2023 18:15:09
- Last modified 10.03.2025 20:32:41
- Source arm-security@arm.com
- Teams watchlist Login
- Open Login
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
Data is provided by the National Vulnerability Database (NVD)
Arm ≫ 5th Gen Gpu Architecture Kernel Driver Version >= r41p0 < r43p0
Arm ≫ Bifrost Gpu Kernel Driver Version >= r0p0 < r43p0
Arm ≫ Midgard Gpu Kernel Driver Version >= r12p0 <= r32p0
Arm ≫ Valhall Gpu Kernel Driver Version >= r19p0 < r43p0
03.10.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
VulnerabilityArm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.
DescriptionApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.169 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.