First published: Mon Oct 02 2023(Updated: )
A local non-privileged user can make improper GPU processing operations to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory.
Credit: arm-security@arm.com arm-security@arm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Arm Bifrost Gpu Kernel Driver | >=r17p0<r44p1 | |
Arm Mali GPU Kernel Driver | >=r41p0<r44p1 | |
Arm Valhall Gpu Kernel Driver | >=r19p0<r44p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-33200.
The severity of CVE-2023-33200 is high (4.7).
The Arm Bifrost Gpu Kernel Driver, Arm Mali GPU Kernel Driver, Arm Valhall Gpu Kernel Driver, and Google Android are affected by CVE-2023-33200.
A local non-privileged user can make improper GPU processing operations to exploit a software race condition and gain access to already freed memory.
You can find more information about CVE-2023-33200 at the following references: [link1](https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities), [link2](https://source.android.com/docs/security/bulletin/2023-10-01/#asterisk), [link3](https://source.android.com/docs/security/bulletin/2023-10-01).