GPU Command Processing Memory Corruption Vulnerability in AMD Radeon Software
CVE-2024-38421 Published on November 4, 2024

Use After Free in Graphics Linux
Memory corruption while processing GPU commands.

NVD

Vulnerability Analysis

CVE-2024-38421 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2024-38421 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2024-38421

stack.watch emails you whenever new vulnerabilities are published in Google Android or AMD Radeon Software. Just hit a watch button to start following.

 
 

Affected Versions

Qualcomm, Inc. Snapdragon: qualcomm fastconnect_6200_firmware: qualcomm fastconnect_7800_firmware: qualcomm qam8255p_firmware: qualcomm qam8295p_firmware: qualcomm qam8620p_firmware: qualcomm qam8650p_firmware: qualcomm qam8775p_firmware: qualcomm qamsrv1h_firmware: qualcomm qamsrv1m_firmware: qualcomm qca6391_firmware: qualcomm qca6574_firmware: qualcomm qca6574a_firmware: qualcomm qca6574au_firmware: qualcomm qca6595_firmware: qualcomm qca6595au_firmware: qualcomm qca6678aq_firmware: qualcomm qca6688aq_firmware: qualcomm qca6696_firmware: qualcomm qca6698aq_firmware: qualcomm qca6797aq_firmware: qualcomm qcm6125_firmware: qualcomm qcs6125_firmware: qualcomm qcs6490_firmware: qualcomm qcs7230_firmware: qualcomm qcs8250_firmware: qualcomm_video_collaboration_vc1_platform_firmware: qualcomm_video_collaboration_vc3_platform_firmware: qualcomm_video_collaboration_vc5_platform_firmware: qualcomm sa6155p_firmware: qualcomm sa7255p_firmware: qualcomm sa7775p_firmware: qualcomm sa8155p_firmware: qualcomm sa8195p_firmware: qualcomm sa8255p_firmware: qualcomm sa8295p_firmware: qualcomm sa8620p_firmware: qualcomm sa8650p_firmware: qualcomm sa8770p_firmware: qualcomm sa8775p_firmware: qualcomm sa9000p_firmware: qualcomm sm4635_firmware: qualcomm sm8635_firmware: qualcomm sm8750_firmware: qualcomm sm8750p_firmware: qualcomm snapdragon_4_gen_1_mobile_platform_firmware: qualcomm snapdragon_480_5g_mobile_platform_firmware: qualcomm snapdragon_695_5g_mobile_platform_firmware: qualcomm snapdragon_8_gen_3_mobile_platform_firmware: qualcomm srv1h_firmware: qualcomm srv1l_firmware: qualcomm srv1m_firmware: qualcomm sw5100_firmware: qualcomm sw5100p_firmware: qualcomm wcd9370_firmware: qualcomm wcd9375_firmware: qualcomm wcd9378_firmware: qualcomm wcd9385_firmware: qualcomm wcd9390_firmware: qualcomm wcd9395_firmware: qualcomm wcn3950_firmware: qualcomm wcn3980_firmware: qualcomm wcn3988_firmware: qualcomm wcn6755_firmware: qualcomm wcn7860_firmware: qualcomm wcn7861_firmware: qualcomm wcn7880_firmware: qualcomm wcn7881_firmware: qualcomm wsa8810_firmware: qualcomm wsa8815_firmware: qualcomm wsa8830_firmware: qualcomm wsa8832_firmware: qualcomm wsa8835_firmware: qualcomm wsa8840_firmware: qualcomm wsa8845_firmware: qualcomm wsa8845h_firmware:

Exploit Probability

EPSS
0.21%
Percentile
43.04%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.