CVE-2024-0671

Mali GPU Kernel Driver allows improper GPU memory processing operations

Description

Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Midgard GPU Kernel Driver: from r19p0 through r32p0; Bifrost GPU Kernel Driver: from r7p0 through r48p0; Valhall GPU Kernel Driver: from r19p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r48p0.

Remediation

Solution:

  • This issue is fixed in Bifrost, Valhall and Arm 5th Gen GPU Architecture Kernel Driver r49p0. Users are recommended to upgrade if they are impacted by this issue.

Category

6.8
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.04%
Vendor Advisory arm.com
Affected: Arm Ltd Midgard GPU Kernel Driver
Affected: Arm Ltd Bifrost GPU Kernel Driver
Affected: Arm Ltd Valhall GPU Kernel Driver
Affected: Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-0671?
CVE-2024-0671 has been scored as a medium severity vulnerability.
How to fix CVE-2024-0671?
To fix CVE-2024-0671: This issue is fixed in Bifrost, Valhall and Arm 5th Gen GPU Architecture Kernel Driver r49p0. Users are recommended to upgrade if they are impacted by this issue.
Is CVE-2024-0671 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-0671 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-0671?
CVE-2024-0671 affects Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.