Article Details

Scrape Timestamp (UTC): 2023-10-03 10:10:49.728

Source: https://thehackernews.com/2023/10/arm-issues-patch-for-mali-gpu-kernel.html

Original Article Text

Click to Toggle View

Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing Exploitation. Arm has released security patches to contain a security flaw in the Mali GPU Kernel Driver that has come under active exploitation in the wild. Tracked as CVE-2023-4211, the shortcoming impacts the following driver versions - "A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory," Arm said in a Monday advisory. "There is evidence that this vulnerability may be under limited, targeted exploitation." The issue, credited to Maddie Stone of Google's Threat Analysis Group (TAG) and Jann Horn of Google Project Zero, has been addressed in Bifrost, Valhall and Arm 5th Gen GPU Architecture Kernel Driver r43p0. Google, in its own monthly Android Security Bulletin for October 2023, said it found indications of targeted exploitation of CVE-2023-4211 and CVE-2023-4863, a severe flaw impacting the WebP image format in the Chrome web browser that was patched last month. Exact specifics surrounding the nature of the attacks are still unclear, but indications are that they may have been weaponized as part of a spyware campaign targeting high-risk individuals. Also resolved by Arm are two other flaws in the Mali GPU Kernel Driver that allow for improper GPU memory processing operations - This is not the first time flaws in Arm Mali GPU Kernel Driver have come under active exploitation. Earlier this year, Google TAG disclosed that CVE-2023-26083 was abused in conjunction with a series of four other flaws by a spyware vendor to penetrate Samsung devices.

Daily Brief Summary

CYBERCRIME // Security Flaw in Arm's Mali GPU Kernel Driver Exploited, Patches Issued

Arm has issued security patches for a vulnerability in its Mali GPU Kernel Driver, which is currently being actively exploited.

The flaw, tracked as CVE-2023-4211, allows a local non-privileged user to exploit improper GPU memory processing operations and access already freed memory.

The patch covers Bifrost, Valhall and Arm 5th Gen GPU Architecture Kernel Driver r43p0.

Google's Threat Analysis Group and Project Zero first discovered the flaw. The Android Security Bulletin for October 2023 has also indicated targeted exploitation of CVE-2023-4211.

The specifics of the attacks are still unclear, but they may have been weaponized as part of a spyware campaign targeting high-risk individuals.

Arm also resolved two other flaws within the Mali GPU Kernel Driver that allow for improper GPU memory processing operations.

This is not the first time flaws in Arm's Mali GPU Kernel Driver have been exploited

earlier this year, a spyware vendor abused a similar vulnerability to penetrate Samsung devices.