CVE-2023-4211
Medium
|5.5Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows a local user without special permissions to access memory that has already been freed by the system, potentially leading to unauthorized data exposure or manipulation. The attacker must have access to the system where the affected GPU driver is running.
Technical Description
A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.
CVSS Vector Analysis
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$759($500-$1K)
Vendor Response
Grade FPatched in 878 days
Quick Information
Published
Oct 1, 2023
over 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
arm
Product
5th gen gpu architecture kernel driver