Arm Warns of Actively Exploited Vulnerability in Mali GPU Kernel Drivers
June 10, 2024
Arm has issued an urgent security advisory regarding a flaw in its Bifrost and Valhall GPU kernel drivers that is currently being exploited. The flaw is a memory-related vulnerability, known as CVE-2024-4610, and is a use-after-free (UAF) vulnerability. This type of flaw occurs when a program continues to use a pointer to a memory location after it has been freed, which can result in information disclosure and arbitrary code execution.
Arm explains that, "A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory". The company has also acknowledged reports of this vulnerability being exploited in the wild and is urging users to upgrade if they are affected by this issue.
The vulnerability was fixed in version r41p0 of the Bifrost and Valhall GPU Kernel Driver, which was released in November 2024. The latest version of the drivers is currently r49p0. There is a possibility that the issue was patched unintentionally and it was discovered due to the ongoing attacks.
The Android supply chain's complexity may result in significant delays for end users receiving the patched drivers. Once Arm releases a security update, device manufacturers need to incorporate it into their firmware, and in many cases, carriers also need to approve it. Depending on the phone model, some manufacturers may choose to prioritize newer devices and discontinue support for older ones.
Bifrost-based Mali GPUs are used in various devices such as smartphones, single-board computers, Chromebooks, and various embedded systems. Valhall GPUs are found in high-end smartphones, automotive infotainment systems, and high-performance smart TVs. It's important to note that some of the affected devices may no longer be supported with security updates.
Latest News
- Chinese Cyber-Espionage Campaign Breaches 20,000 FortiGate Systems Globally: MIVD
- Veeam Backup Enterprise Manager's Critical Authentication Bypass Flaw: Public Exploit Available
- Critical Remote Code Execution Vulnerability in PHP Could Impact Millions of Servers
- SolarWinds Patches Multiple High-Severity Vulnerabilities in Serv-U and its Platform
- Critical Remote Code Execution Vulnerability in PHP for Windows: All Versions Impacted
Like what you see?
Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.