CVE-2023-4211

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a local user without special permissions to access memory that has already been freed by the system, potentially leading to unauthorized data exposure or manipulation. The attacker must have access to the system where the affected GPU driver is running.

Technical Description

A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$759($500-$1K)
Vendor Response
Grade FPatched in 878 days

Quick Information

Published

Oct 1, 2023

over 2 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

arm

Product

5th gen gpu architecture kernel driver