CVE-2024-21472

8.4 HIGH

📋 TL;DR

This vulnerability involves memory corruption in the kernel when handling GPU operations, allowing attackers to potentially execute arbitrary code with kernel privileges. It affects systems using Qualcomm GPUs, particularly mobile devices and embedded systems. Exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Qualcomm Adreno GPU devices
  • Snapdragon-powered devices
Versions: Specific versions not detailed in reference; check Qualcomm advisory for affected chipsets.
Operating Systems: Android, Linux-based systems with Qualcomm GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm GPU drivers; exact models depend on chipset versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level code execution, allowing attackers to install persistent malware, steal all data, or brick the device.

🟠

Likely Case

Local privilege escalation from user to kernel mode, enabling attackers to bypass security controls and gain elevated access.

🟢

If Mitigated

Limited impact with proper kernel hardening, SELinux/AppArmor policies, and restricted GPU access.

🌐 Internet-Facing: LOW - Requires local access or malware execution first.
🏢 Internal Only: MEDIUM - Could be exploited by malicious apps or users with local access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger GPU operations; kernel exploitation adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm security bulletin for specific chipset fixes.

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset. 2. Obtain updated GPU drivers from device manufacturer. 3. Apply firmware/OS update containing patched kernel. 4. Reboot device.

🔧 Temporary Workarounds

Restrict GPU access

linux

Limit GPU operations to trusted applications via SELinux/AppArmor policies.

setenforce 1
Configure appropriate SELinux/AppArmor domains for GPU access

🧯 If You Can't Patch

  • Isolate affected devices from critical networks and sensitive data.
  • Implement application allowlisting to prevent untrusted apps from accessing GPU functions.

🔍 How to Verify

Check if Vulnerable:

Check device chipset and kernel version against Qualcomm advisory; use 'cat /proc/cpuinfo' or device settings.

Check Version:

uname -r (kernel) or check device firmware version in settings

Verify Fix Applied:

Verify kernel/driver version matches patched version in advisory; check for April 2024 security updates.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • GPU driver crash messages in dmesg
  • Unexpected privilege escalation attempts

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for kernel module crashes or privilege escalation events in system logs.

🔗 References

📤 Share & Export