CISA KEV 정보
| 취약점명 | Arm Mali GPU Kernel Driver Use-After-Free Vulnerability |
|---|---|
| 설명 | Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that may allow a non-privileged user to gain root privilege and/or disclose information. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-416 |
| 등록일 (KEV) | 2023-03-30 |
| 조치 기한 | 2023-04-20 |
| 추가 참고 | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2022-38181 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H설명: The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0.
CWE: CWE-416 | CWE-416
참조
- http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html [Third Party Advisory, VDB Entry]
- https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities [Vendor Advisory]
- https://developer.arm.com/support/arm-security-updates [Vendor Advisory]
- https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ [Exploit, Third Party Advisory]
- https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/ [Exploit, Third Party Advisory]
- http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html [Third Party Advisory, VDB Entry]
- https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities [Vendor Advisory]
- https://developer.arm.com/support/arm-security-updates [Vendor Advisory]
- https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ [Exploit, Third Party Advisory]
- https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/ [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-38181 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.