CVE-2024-23360
📋 TL;DR
This vulnerability allows memory corruption when creating an LPAC client because the LPAC engine could access GPU registers. It affects devices with Qualcomm chipsets that use the vulnerable GPU driver components.
💻 Affected Systems
- Qualcomm chipsets with Adreno GPU
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to arbitrary code execution at kernel privilege, potentially allowing attackers to install persistent malware, exfiltrate sensitive data, or brick the device.
Likely Case
Local privilege escalation allowing an attacker to gain elevated system privileges from a lower-privileged context, potentially leading to data theft or further system compromise.
If Mitigated
Limited impact if proper access controls and sandboxing prevent unauthorized GPU register access, though some system instability may still occur.
🎯 Exploit Status
Requires local access and ability to interact with GPU subsystem. No public exploit code available as of advisory publication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm June 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for your specific chipset. 2. Obtain updated GPU driver/firmware from device manufacturer. 3. Apply update following manufacturer instructions. 4. Reboot device to activate patched components.
🔧 Temporary Workarounds
Restrict GPU access
linuxImplement SELinux/AppArmor policies to restrict GPU register access to trusted processes only
# Requires custom SELinux/AppArmor policy configuration
# Consult device manufacturer for specific implementation
🧯 If You Can't Patch
- Implement strict application sandboxing to limit GPU access
- Monitor for unusual GPU subsystem activity or privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check device chipset and GPU driver version against Qualcomm's advisory. Use 'cat /proc/cpuinfo' and GPU driver version commands.
Check Version:
# For Android/Linux: dmesg | grep -i adreno OR check GPU driver version in system settings
Verify Fix Applied:
Verify GPU driver version has been updated to patched version specified in Qualcomm advisory.
📡 Detection & Monitoring
Log Indicators:
- Kernel logs showing GPU access violations
- SELinux/AppArmor denials for GPU register access
- Unexpected privilege escalation events
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
source="kernel" AND ("GPU" OR "adreno") AND ("access denied" OR "violation")