{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T04:39:03.132","vulnerabilities":[{"cve":{"id":"CVE-2023-26083","sourceIdentifier":"cve@mitre.org","published":"2023-04-06T16:15:07.843","lastModified":"2025-11-03T18:14:16.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Memory leak vulnerability in Mali GPU Kernel Driver in Midgard GPU Kernel Driver all versions from r6p0 - r32p0, Bifrost GPU Kernel Driver all versions from r0p0 - r42p0, Valhall GPU Kernel Driver all versions from r19p0 - r42p0, and Avalon GPU Kernel Driver all versions from r41p0 - r42p0 allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata."},{"lang":"es","value":"La vulnerabilidad de pérdida de memoria en el controlador del kernel de GPU de Mali en el controlador del kernel de GPU de Midgard todas las versiones de r6p0 a r32p0, el controlador del kernel de GPU de Bifrost todas las versiones de r0p0 a r42p0, el controlador del kernel de GPU de Valhall todas las versiones de r19p0 a r42p0 y el controlador del kernel de GPU de Avalon todas las versiones de r41p0 a r42p0 permite que un usuario sin privilegios realice operaciones de procesamiento de GPU válidas que exponen metadatos confidenciales del kernel."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}]},"cisaExploitAdd":"2023-04-07","cisaActionDue":"2023-04-28","cisaRequiredAction":"Apply updates per vendor instructions.","cisaVulnerabilityName":"Arm Mali GPU Kernel Driver Information Disclosure Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r41p0","versionEndExcluding":"r43p0","matchCriteriaId":"574A1E71-2B1E-48D4-AA93-974B4E34C64F"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r0p0","versionEndExcluding":"r43p0","matchCriteriaId":"C7205027-9AE7-4095-B0A7-B1ECA71ACCAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r6p0","versionEndIncluding":"r32p0","matchCriteriaId":"ABA04388-28FC-4F87-85F4-B7FD0B553611"},{"vulnerable":true,"criteria":"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*","versionStartIncluding":"r19p0","versionEndExcluding":"r43p0","matchCriteriaId":"38BF4620-6A5C-4034-8D17-BC1AC5F8C711"}]}]}],"references":[{"url":"https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.cybersecurity-help.cz/vdb/SB2023033049","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.cybersecurity-help.cz/vulnerabilities/74210/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.cybersecurity-help.cz/vdb/SB2023033049","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.cybersecurity-help.cz/vulnerabilities/74210/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-26083","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}