CINXE.COM

NVD - CVE-2022-38181

<!DOCTYPE html> <html lang="en"> <head> <title>NVD - CVE-2022-38181</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <meta http-equiv="content-style-type" content="text/css" /> <meta http-equiv="content-script-type" content="text/javascript" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link href="/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet" /> <link href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/base-style.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/media-resize.css" type="text/css" rel="stylesheet" /> <meta name="theme-color" content="#000000"> <script src="/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/site-media/js/forms.js" type="text/javascript"></script> <script src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script> <style id="antiClickjack"> body>* { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body>* { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/site-media/css/nvd-style.css" type="text/css" rel="stylesheet" /> <link href="/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180" /> <link href="/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32" /> <link href="/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16" /> <link href="/site-media/images/favicons/manifest.json" rel="manifest" /> <link href="/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000" /> <link href="/site-media/images/favicons/favicon.ico" rel="shortcut icon" /> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" /> <link href="/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon" /> <link href="/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon" /> <meta charset="UTF-8"> <script src="/site-media/js/vulnerability/vulnDetail.js" type="text/javascript"></script> <script src="/site-media/js/vulnerability/cvssVulnDetail.js" type="text/javascript"></script> </head> <body> <header role="banner" title="Site Banner"> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://nvd.nist.gov">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <div> <div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header" style="height:104px"> <a class="navbar-brand" href="https://www.nist.gov" target="_blank" rel="noopener noreferrer" id="navbar-brand-image" style="padding-top: 36px"> <img alt="National Institute of Standards and Technology" src="/site-media/images/nist/nist-logo.svg" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/general"> General <span class="expander fa fa-plus" id="nvd-header-menu-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="https://www.nist.gov/itl/nvd">News and Status Updates</a> </p> </div> <div class="col-lg-4"> <p> <a href="/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/general/visualizations">Visualizations</a> </p> <p> <a href="/general/legal-disclaimer">Legal Disclaimer</a> </p> </div> </div> </div></li> <li><a href="/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="nvd-header-menu-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln/search">Search &amp; Statistics</a> </p> <p> <a href="/vuln/categories">Weakness Types</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln/data-feeds">Legacy Data Feeds</a> </p> <p> <a href="/vuln/vendor-comments">Vendor Comments</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span class="expander fa fa-plus" id="nvd-header-menu-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0 Calculators</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x Calculators</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0 Calculator</a> </p> </div> </div> </div></li> <li><a href="/products"> Products <span class="expander fa fa-plus" id="nvd-header-menu-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/products/cpe">CPE Dictionary</a> </p> <p> <a href="/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/developers">Developers<span class="expander fa fa-plus" id="nvd-header-menu-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/developers/start-here">Start Here</a> </p> <p> <a href="/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/developers/data-sources">Data Sources</a> </p> <p> <a href="/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/contact"> Contact NVD </a></li> <li><a href="/other"> Other Sites <span class="expander fa fa-plus" id="nvd-header-menu-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://ncp.nist.gov">Checklist (NCP) Repository</a> </p> <p> <a href="https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/search"> Search <span class="expander fa fa-plus" id="nvd-header-menu-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg" >National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center" >NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;padding-top: 14px"> <img id="img-logo-nvd-lg" alt="National Vulnerability Database" src="/site-media/images/F_NIST-Logo-NVD-white.svg" width="500" height="100"> </a> </div> </div> </div> </section> </div> </div> </header> <main> <div> <div id="body-section" class="container"> <div class="row"> <ol class="breadcrumb"> <li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li> </ol> </div> <div> <style> /* wrap the words for CVSS v4 */ #nistv4Metric { word-wrap: break-word; } </style> <script> /*<![CDATA[*/ var vuln = { nistV4Present: false, cnaV4Present: false, nistV3Present: true, cnaV3Present: false, nistV2Present: false, cnaV2Present: false }; /*]]>*/ </script> <div> </div> <div id="vulnDetailPanel"> <table id="vulnDetailTableView" style="border-collapse: collapse;"> <tr> <td colspan="2"> <h2 data-testid="page-header"> <i class="fa fa-bug fa-flip-vertical"></i><span data-testid="page-header-vuln-id">CVE-2022-38181</span> Detail </h2> <div class="row"> <div class="col-lg-9 col-md-7 col-sm-12"> <div id="vulnShowWarningDiv" data-testid="vuln-warning-container"> <div role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info"> <strong class="h4Size"><span data-testid="vuln-warning-status-name">Modified</span></strong> <hr/> <p data-testid="vuln-warning-banner-content">This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.</p> </div> </div> <h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description </h3> <p data-testid="vuln-description">The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0.</p><br/> <!-- CVSS Severity and Vector Strings --> <div id="vulnCvssPanel" data-testid="vuln-cvss-container" class="row bs-callout bs-callout-success cvssVulnDetail"> <h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3> &ensp; <div id="cvssVulnDetailBtn" class="btn-group"> <button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data" class="btn default btn-lg cvssBtn">CVSS Version 4.0 </button> <button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data" class="btn default btn-lg cvssBtn">CVSS Version 3.x </button> <button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data" class="btn default btn-lg cvssBtn">CVSS Version 2.0 </button> </div> <div id="cvssEnrichmentNotes"> <i> <small> NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed. </small> </i> </div> <!-- CVSS v4.0 --> <div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel"> <strong>CVSS 4.0 Severity and Vector Strings:</strong> <!-- NIST --> <div class="row no-gutters"> <br/> <div class="col-lg-3 col-sm-6"> <div class="row"> <div class="col-lg-3 col-sm-6"> <img src="/site-media/images/NVD_NVD_Stack_Plain.svg" class="cvssNvdIcon" alt="NIST CVSS score"> </div> <div class="col-lg-9 col-sm-6"> <strong>NIST:</strong>&nbsp;<span class="wrapData" data-testid="vuln-cvss4-source-nvd">NVD</span> </div> </div> </div> <div class="col-lg-3 col-sm-6"> <span><strong> </strong><span class="severityDetail"> <a id="Cvss4NistCalculatorAnchorNA" class="label label-default" data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span> </div> <div class="col-lg-6 col-sm-12"> <span> <span data-testid="vuln-cvss4-nist-vector-na">NVD assessment not yet provided.</span></span> <input type="hidden" id="nistV4MetricHidden" value=""/> </div> </div> <!-- CNA --> <!-- ADP --> </div> <!-- CVSS V3.x --> <div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel" style="display: none;"> <strong>CVSS 3.x Severity and Vector Strings:</strong> <!-- NIST --> <div class="row no-gutters"> <br/> <div class="col-lg-3 col-sm-6"> <div class="row"> <div class="col-lg-3 col-sm-6"> <img src="/site-media/images/NVD_NVD_Stack_Plain.svg" class="cvssNvdIcon" alt="NIST CVSS score"> </div> <div class="col-lg-9 col-sm-6"> <strong>NIST:</strong>&nbsp;<span class="wrapData" data-testid="vuln-cvss3-source-nvd">NVD</span> </div> </div> </div> <div class="col-lg-3 col-sm-6"> <span><strong>Base Score:</strong>&nbsp;<span class="severityDetail"> <a id="Cvss3NistCalculatorAnchor" href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-38181&amp;vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" data-testid="vuln-cvss3-panel-score" class="label label-danger">8.8 HIGH</a> </span></span> </div> <div class="col-lg-6 col-sm-12"> <span><strong>Vector:</strong>&nbsp; <span data-testid="vuln-cvss3-nist-vector" class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span></span> <input type="hidden" id="nistV3MetricHidden" value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;8.8 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;HIGH&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 5.9 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 2.8 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Network &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Unchanged &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/> </div> </div> <!-- CNA --> <!-- ADP --> <!-- <div id="cvss3FootNote" class="cvssFootNote" >--> <!-- <br/><br/>--> <!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>--> <!-- </div>--> </div> <!-- CVSS V2.0 --> <div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel" style="display: none;"> <strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/> <!-- NIST --> <div class="row no-gutters"> <div class="col-lg-3 col-sm-6"> <div class="row"> <div class="col-lg-3 col-sm-6"> <img src="/site-media/images/NVD_NVD_Stack_Plain.svg" class="cvssNvdIcon" alt="National Institute of Standards and Technology"> </div> <div class="col-lg-9 col-sm-6"> <strong>NIST:</strong>&nbsp;<span data-testid="vuln-cvss2-source-nvd">NVD</span> </div> </div> </div> <div class="col-lg-3 col-sm-6"> <span><strong>Base Score:</strong>&nbsp;<span class="severityDetail"><a id="Cvss2CalculatorAnchorNA" class="label label-default" data-testid="vuln-cvss2-panel-score-na" href=''>N/A</a></span></span> </div> <div class="col-lg-6 col-sm-12"> <span><span data-testid="vuln-cvss2-panel-vector-na">NVD assessment not yet provided.</span></span> <input type="hidden" id="nistV2MetricHidden" value=""/> </div> </div> <!-- CNA --> <!-- ADP --> <!-- <div id = "cvss2FootNote" class="cvssFootNote" >--> <!-- <br/><br/>--> <!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>--> <!-- </div>--> </div> </div> <div class="row col-sm-12"> <div id="vulnHyperlinksPanel"> <h3>References to Advisories, Solutions, and Tools</h3> <p> By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to <a href="mailto:nvd@nist.gov">nvd@nist.gov</a>. </p> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-hyperlinks-table"> <thead> <tr> <th>Hyperlink</th> <th>Resource</th> </tr> </thead> <tbody> <tr data-testid="vuln-hyperlinks-row-0"> <td data-testid="vuln-hyperlinks-link-0"> <a href="http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html" target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html</a></td> <td data-testid="vuln-hyperlinks-resType-0"> <span> <span class="badge">Third Party Advisory</span>&nbsp; </span><span> <span class="badge">VDB Entry</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-1"> <td data-testid="vuln-hyperlinks-link-1"> <a href="http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html" target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html</a></td> <td data-testid="vuln-hyperlinks-resType-1"> <span> <span class="badge">Third Party Advisory</span>&nbsp; </span><span> <span class="badge">VDB Entry</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-2"> <td data-testid="vuln-hyperlinks-link-2"> <a href="https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities" target="_blank" rel="noopener noreferrer">https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities</a></td> <td data-testid="vuln-hyperlinks-resType-2"> <span> <span class="badge">Vendor Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-3"> <td data-testid="vuln-hyperlinks-link-3"> <a href="https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities" target="_blank" rel="noopener noreferrer">https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities</a></td> <td data-testid="vuln-hyperlinks-resType-3"> <span> <span class="badge">Vendor Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-4"> <td data-testid="vuln-hyperlinks-link-4"> <a href="https://developer.arm.com/support/arm-security-updates" target="_blank" rel="noopener noreferrer">https://developer.arm.com/support/arm-security-updates</a></td> <td data-testid="vuln-hyperlinks-resType-4"> <span> <span class="badge">Vendor Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-5"> <td data-testid="vuln-hyperlinks-link-5"> <a href="https://developer.arm.com/support/arm-security-updates" target="_blank" rel="noopener noreferrer">https://developer.arm.com/support/arm-security-updates</a></td> <td data-testid="vuln-hyperlinks-resType-5"> <span> <span class="badge">Vendor Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-6"> <td data-testid="vuln-hyperlinks-link-6"> <a href="https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/" target="_blank" rel="noopener noreferrer">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/</a></td> <td data-testid="vuln-hyperlinks-resType-6"> <span> <span class="badge">Exploit</span>&nbsp; </span><span> <span class="badge">Third Party Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-7"> <td data-testid="vuln-hyperlinks-link-7"> <a href="https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/" target="_blank" rel="noopener noreferrer">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/</a></td> <td data-testid="vuln-hyperlinks-resType-7"> <span> <span class="badge">Exploit</span>&nbsp; </span><span> <span class="badge">Third Party Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-8"> <td data-testid="vuln-hyperlinks-link-8"> <a href="https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/" target="_blank" rel="noopener noreferrer">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/</a></td> <td data-testid="vuln-hyperlinks-resType-8"> <span> <span class="badge">Exploit</span>&nbsp; </span><span> <span class="badge">Third Party Advisory</span>&nbsp; </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-9"> <td data-testid="vuln-hyperlinks-link-9"> <a href="https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/" target="_blank" rel="noopener noreferrer">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/</a></td> <td data-testid="vuln-hyperlinks-resType-9"> <span> <span class="badge">Exploit</span>&nbsp; </span><span> <span class="badge">Third Party Advisory</span>&nbsp; </span> </td> </tr> </tbody> </table> </div> <div id="vulnCisaExploit"> <h3> This CVE is in CISA's Known Exploited Vulnerabilities Catalog </h3> <p> Reference <a href="https://www.cisa.gov/binding-operational-directive-22-01"> CISA's BOD 22-01</a> and <a href="https://cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> for further guidance and requirements. </p> <table class="table table-striped table-condensed table-bordered detail-table"> <thead> <tr> <th>Vulnerability Name</th> <th>Date Added</th> <th>Due Date</th> <th>Required Action</th> </tr> </thead> <tbody> <tr> <td>Arm Mali GPU Kernel Driver Use-After-Free Vulnerability</td> <td>03/30/2023</td> <td>04/20/2023</td> <td>Apply updates per vendor instructions.</td> </tr> </tbody> </table> </div> <div id="vulnTechnicalDetailsDiv" class="technicalDetails" data-testid="vuln-technical-details-container"> <h3>Weakness Enumeration</h3> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-CWEs-table"> <thead> <tr> <th>CWE-ID</th> <th>CWE Name</th> <th>Source</th> </tr> </thead> <tbody> <tr data-testid="vuln-CWEs-row-0"> <td data-testid="vuln-CWEs-link-0"> <a href="http://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="noopener noreferrer">CWE-416</a> </td> <td data-testid="vuln-CWEs-link-0">Use After Free</td> <td data-testid="vuln-cwes-assigner-0"> <span class="cweSource" data-testid="vuln-cwes-assigner-0-0" > <img src="/site-media/images/NVD_NVD_Stack_Plain.svg" class="cweNvdIcon" alt="cwe source acceptance level"> <span>NIST  </span> </span> </td> </tr> </tbody> </table> </div> <div> <h3> Known Affected Software Configurations <small> <a id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch to CPE 2.2</a></small> </h3> <span id="vulnConfigurationsArea"></span> <input type="hidden" id="cveIdHidden" value="CVE-2022-38181"/> <div> <div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div> <div id="vulnCpeTree" style="display: none;"></div> <input type="hidden" id="InputRestBasePath" value="/rest/public"> <input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:5,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aarm%3Abifrost_gpu_kernel_driver%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:arm:bifrost_gpu_kernel_driver&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0&quot;,&quot;id&quot;:&quot;15657579&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) r0p0 up to (including) r38p1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;r0p0&quot;,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;r38p1&quot;,&quot;rangeId&quot;:&quot;534008&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aarm%3Abifrost_gpu_kernel_driver%3Ar39p0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r39p0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:arm:bifrost_gpu_kernel_driver:r39p0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1&quot;,&quot;id&quot;:&quot;15657578&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aarm%3Amidgard_gpu_kernel_driver%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:arm:midgard_gpu_kernel_driver&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-2&quot;,&quot;id&quot;:&quot;15657581&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) r4p0 up to (including) r31p0 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;r4p0&quot;,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;r31p0&quot;,&quot;rangeId&quot;:&quot;631468&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aarm%3Avalhall_gpu_kernel_driver%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:arm:valhall_gpu_kernel_driver&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-3&quot;,&quot;id&quot;:&quot;15657580&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) r19p0 up to (including) r38p1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;r19p0&quot;,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;r38p1&quot;,&quot;rangeId&quot;:&quot;534009&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aarm%3Avalhall_gpu_kernel_driver%3Ar39p0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:arm:valhall_gpu_kernel_driver:r39p0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:arm:valhall_gpu_kernel_driver:r39p0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-4&quot;,&quot;id&quot;:&quot;15657577&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]"/> <p id="vulnCpeInfo" > <small> <i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br /> <a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br /> </small> </p> <script src="/site-media/js/vulnerability/cpe-match.js" type="text/javascript"></script> <script src="/site-media/js/vulnerability/configurationListing.js" type="text/javascript"></script> </div> </div> <div id="vulnChangeHistoryDiv" data-testid="vuln-change-history-container"> <h3 id="VulnChangeHistorySection">Change History</h3> <small> 9 change records found <a href="#VulnChangeHistorySection" style="text-decoration: underline" id="changeHistoryToggle">show changes</a> </small> <div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span data-testid="vuln-change-history-date-0">11/21/2024 2:15:57 AM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">Reference</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre style="word-break: break-all !important">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">Reference</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre style="word-break: break-all !important">https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">Reference</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre style="word-break: break-all !important">https://developer.arm.com/support/arm-security-updates</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">Reference</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre style="word-break: break-all !important">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">Reference</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre style="word-break: break-all !important">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-1">Modified Analysis by NIST</span> <span data-testid="vuln-change-history-date-1">6/28/2024 9:41:11 AM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-1"> <td data-testid="vuln-change-history-1-action">Changed</td> <td data-testid="vuln-change-history-1-type">Reference Type</td> <td data-testid="vuln-change-history-1-old"> <pre style="word-break: break-all !important">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-1-new"> <pre style="word-break: break-all !important">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html Third Party Advisory, VDB Entry</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-2">CVE Modified by MITRE</span> <span data-testid="vuln-change-history-date-2">5/14/2024 7:15:11 AM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-3">CPE Deprecation Remap by NIST</span> <span data-testid="vuln-change-history-date-3">12/13/2023 8:51:52 AM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-3"> <td data-testid="vuln-change-history-3-action">Changed</td> <td data-testid="vuln-change-history-3-type">CPE Configuration</td> <td data-testid="vuln-change-history-3-old"> <pre style="word-break: break-all !important">OR *cpe:2.3:a:arm:midguard_gpu_kernel_driver:*:*:*:*:*:*:*:* versions from (including) r4p0 from (including) r31p0</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-3-new"> <pre style="word-break: break-all !important">OR *cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:* versions from (including) r4p0 from (including) r31p0</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-4">CVE Modified by MITRE</span> <span data-testid="vuln-change-history-date-4">6/12/2023 3:16:48 AM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-4"> <td data-testid="vuln-change-history-4-action">Added</td> <td data-testid="vuln-change-history-4-type">Reference</td> <td data-testid="vuln-change-history-4-old"> </td> <td data-testid="vuln-change-history-4-new"> <pre style="word-break: break-all !important">http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html [No Types Assigned]</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-5">Modified Analysis by NIST</span> <span data-testid="vuln-change-history-date-5">3/01/2023 1:11:45 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-5"> <td data-testid="vuln-change-history-5-action">Changed</td> <td data-testid="vuln-change-history-5-type">Reference Type</td> <td data-testid="vuln-change-history-5-old"> <pre style="word-break: break-all !important">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-5-new"> <pre style="word-break: break-all !important">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ Exploit, Third Party Advisory</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-5"> <td data-testid="vuln-change-history-5-action">Changed</td> <td data-testid="vuln-change-history-5-type">Reference Type</td> <td data-testid="vuln-change-history-5-old"> <pre style="word-break: break-all !important">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/ No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-5-new"> <pre style="word-break: break-all !important">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/ Exploit, Third Party Advisory</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-6">CVE Modified by MITRE</span> <span data-testid="vuln-change-history-date-6">1/23/2023 1:15:10 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-6"> <td data-testid="vuln-change-history-6-action">Added</td> <td data-testid="vuln-change-history-6-type">Reference</td> <td data-testid="vuln-change-history-6-old"> </td> <td data-testid="vuln-change-history-6-new"> <pre style="word-break: break-all !important">https://securitylab.github.com/advisories/GHSL-2022-054_Arm_Mali/ [No Types Assigned]</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-7">CVE Modified by MITRE</span> <span data-testid="vuln-change-history-date-7">1/23/2023 12:15:10 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-7"> <td data-testid="vuln-change-history-7-action">Changed</td> <td data-testid="vuln-change-history-7-type">Description</td> <td data-testid="vuln-change-history-7-old"> <pre style="word-break: break-all !important">An Arm product family through 2022-08-12 mail GPU kernel driver allows non-privileged users to make improper GPU processing operations to gain access to already freed memory.</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-7-new"> <pre style="word-break: break-all !important">The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0.</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-7"> <td data-testid="vuln-change-history-7-action">Added</td> <td data-testid="vuln-change-history-7-type">Reference</td> <td data-testid="vuln-change-history-7-old"> </td> <td data-testid="vuln-change-history-7-new"> <pre style="word-break: break-all !important">https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/ [No Types Assigned]</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-8">Initial Analysis by NIST</span> <span data-testid="vuln-change-history-date-8">10/28/2022 3:00:56 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-8"> <td data-testid="vuln-change-history-8-action">Added</td> <td data-testid="vuln-change-history-8-type">CVSS V3.1</td> <td data-testid="vuln-change-history-8-old"> </td> <td data-testid="vuln-change-history-8-new"> <pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-8"> <td data-testid="vuln-change-history-8-action">Added</td> <td data-testid="vuln-change-history-8-type">CWE</td> <td data-testid="vuln-change-history-8-old"> </td> <td data-testid="vuln-change-history-8-new"> <pre style="word-break: break-all !important">NIST CWE-416</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-8"> <td data-testid="vuln-change-history-8-action">Added</td> <td data-testid="vuln-change-history-8-type">CPE Configuration</td> <td data-testid="vuln-change-history-8-old"> </td> <td data-testid="vuln-change-history-8-new"> <pre style="word-break: break-all !important">OR *cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:* versions from (including) r0p0 up to (including) r38p1 *cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r39p0:*:*:*:*:*:*:* *cpe:2.3:a:arm:midguard_gpu_kernel_driver:*:*:*:*:*:*:*:* versions from (including) r4p0 up to (including) r31p0 *cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:* versions from (including) r19p0 up to (including) r38p1 *cpe:2.3:a:arm:valhall_gpu_kernel_driver:r39p0:*:*:*:*:*:*:*</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-8"> <td data-testid="vuln-change-history-8-action">Changed</td> <td data-testid="vuln-change-history-8-type">Reference Type</td> <td data-testid="vuln-change-history-8-old"> <pre style="word-break: break-all !important">https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-8-new"> <pre style="word-break: break-all !important">https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities Vendor Advisory</pre> <br/> <br /> </td> </tr> <tr data-testid="vuln-change-history-8"> <td data-testid="vuln-change-history-8-action">Changed</td> <td data-testid="vuln-change-history-8-type">Reference Type</td> <td data-testid="vuln-change-history-8-old"> <pre style="word-break: break-all !important">https://developer.arm.com/support/arm-security-updates No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-8-new"> <pre style="word-break: break-all !important">https://developer.arm.com/support/arm-security-updates Vendor Advisory</pre> <br/> <br /> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div class="col-lg-3 col-md-5 col-sm-12"> <div class="bs-callout bs-callout-info"> <h4>Quick Info</h4> <strong>CVE Dictionary Entry:</strong><br/> <a target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry" href="https://cve.org/CVERecord?id=CVE-2022-38181">CVE-2022-38181</a><br/> <strong>NVD Published Date:</strong><br/> <span data-testid="vuln-published-on">10/25/2022</span><br/> <strong>NVD Last Modified:</strong><br/> <span data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong> Source:</strong><br/> <span data-testid="vuln-current-description-source">MITRE</span><br/> </div> </div> </div> </td> </tr> </table> </div> <!-- Hidden input for padding --> <input type="hidden" value="qai7XpmROLashsYAA7VTY0Fn8AEbaUsjHvknTqlFcfJibyQZMMhn5qW4JeCg2Vl5sKlEi1nRcwSFlt7UF0psim4Zf1kI4UVj80pmkua25ErUzzzwZUNeLGynWbZuiNsmkBLtjV4KCXMPWhsYlKWDPjmN3Q7sq3utG6b9rURZFmHqtDrBnRucpwioEhYDdk0uGSBigB62x3uuErY12nzVx6ljvjruf6G3hywRZOIXiLGvmdPqHuFWUAVBJR6MnxPe1XeWnsGILZBr8NHwhLq3cCQDBBStMyt00TkBMQ9AunWm4H9mteeB5t1R" id="padding" name="padding"/> </div> </div> </div> </main> <footer id="footer" role="contentinfo"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo" /> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://www.nist.gov" title="National Institute of Standards and Technology" rel="home" target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img src="/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo" /> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="mailto:nvd@nist.gov">Webmaster</a> | <a href="https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://www.nist.gov/about-nist/visit" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 </div> </div> </div> <div class="row"> <nav title="Footer Navigation" role="navigation" class="row footer-bottom-links-container"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a> | <a href="https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://www.nist.gov/foia">FOIA</a> | <a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://www.commerce.gov/">Commerce.gov</a> | <a href="https://www.science.gov/">Science.gov</a> | <a href="https://www.usa.gov/">USA.gov</a> </p> </nav> </div> </div> </footer> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10