⚠ Actively exploited
Added to CISA KEV on 2023-10-03. Federal agencies required to patch by 2023-10-24. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2023-4211 — Use After Free in ARM 5TH GEN GPU Architecture Kernel Driver
Severity
5.5MEDIUMNVD
EPSS
0.2%
top 58.33%
CISA KEV
KEV
Added 2023-10-03
Due 2023-10-24
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 1
KEV addedOct 3
KEV dueOct 24
Latest updateMay 22
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages12 packages
🔴Vulnerability Details
4GHSA▶
GHSA-7537-p54v-mh3v: A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory↗2023-10-01
GHSA
▶
📋Vendor Advisories
4🕵️Threat Intelligence
3💬Community
3Bugzilla
▶
Bugzilla▶
CVE-2023-52560 kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions()↗2024-03-04