mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
56 lines
1.8 KiB
JSON
56 lines
1.8 KiB
JSON
{
|
|
"id": "CVE-2023-4211",
|
|
"sourceIdentifier": "arm-security@arm.com",
|
|
"published": "2023-10-01T18:15:09.927",
|
|
"lastModified": "2023-10-03T05:15:51.343",
|
|
"vulnStatus": "Undergoing Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Un usuario local sin privilegios puede realizar operaciones inadecuadas de procesamiento de la memoria de la GPU para obtener acceso a la memoria ya liberada."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "arm-security@arm.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-416"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://arstechnica.com/security/2023/10/vulnerable-arm-gpu-drivers-under-active-exploitation-patches-may-not-be-available/",
|
|
"source": "arm-security@arm.com"
|
|
},
|
|
{
|
|
"url": "https://chromereleases.googleblog.com/2023/08/long-term-support-channel-update-for_23.html",
|
|
"source": "arm-security@arm.com"
|
|
},
|
|
{
|
|
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-chromeos_25.html",
|
|
"source": "arm-security@arm.com"
|
|
},
|
|
{
|
|
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
|
|
"source": "arm-security@arm.com"
|
|
},
|
|
{
|
|
"url": "https://source.android.com/docs/security/bulletin/pixel/2023-09-01",
|
|
"source": "arm-security@arm.com"
|
|
},
|
|
{
|
|
"url": "https://www.bleepingcomputer.com/news/security/arm-warns-of-mali-gpu-flaws-likely-exploited-in-targeted-attacks/",
|
|
"source": "arm-security@arm.com"
|
|
}
|
|
]
|
|
} |