2023-10-01 20:00:27 +00:00
{
"id" : "CVE-2023-4211" ,
"sourceIdentifier" : "arm-security@arm.com" ,
"published" : "2023-10-01T18:15:09.927" ,
2023-10-04 18:00:29 +00:00
"lastModified" : "2023-10-04T17:15:10.337" ,
2023-10-03 06:00:28 +00:00
"vulnStatus" : "Undergoing Analysis" ,
2023-10-04 18:00:29 +00:00
"cisaExploitAdd" : "2023-10-03" ,
"cisaActionDue" : "2023-10-24" ,
"cisaRequiredAction" : "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable." ,
"cisaVulnerabilityName" : "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability" ,
2023-10-01 20:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.\n\n"
2023-10-03 06:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Un usuario local sin privilegios puede realizar operaciones inadecuadas de procesamiento de la memoria de la GPU para obtener acceso a la memoria ya liberada."
2023-10-01 20:00:27 +00:00
}
] ,
"metrics" : { } ,
"weaknesses" : [
{
"source" : "arm-security@arm.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"references" : [
{
"url" : "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities" ,
"source" : "arm-security@arm.com"
}
]
}