CVE-2024-43048

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when invalid input is passed to the GPU Headroom API call in Qualcomm components. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices using vulnerable Qualcomm GPU drivers.

💻 Affected Systems

Products:
  • Qualcomm GPU drivers
  • Devices with Qualcomm Adreno GPUs
Versions: Specific versions not detailed in reference; check Qualcomm advisory for affected versions
Operating Systems: Android, Linux-based systems with Qualcomm GPU support
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where GPU Headroom API is accessible to applications

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Application crash or denial of service affecting GPU functionality

🟢

If Mitigated

Contained crash within the GPU driver process without system-wide impact

🌐 Internet-Facing: MEDIUM - Requires specific API calls but could be triggered through malicious apps
🏢 Internal Only: MEDIUM - Local applications could exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to call GPU Headroom API with crafted input; likely requires local application execution

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm December 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html

Restart Required: No

Instructions:

1. Check Qualcomm advisory for affected chipset/device 2. Obtain updated GPU driver from device manufacturer 3. Apply driver update through standard system update process

🔧 Temporary Workarounds

Restrict GPU API access

Android/Linux

Limit which applications can access GPU Headroom API through SELinux/AppArmor policies

🧯 If You Can't Patch

  • Implement strict application vetting and sandboxing
  • Monitor for abnormal GPU driver crashes or memory usage patterns

🔍 How to Verify

Check if Vulnerable:

Check device chipset against Qualcomm advisory and verify GPU driver version

Check Version:

adb shell dumpsys gpu (Android) or check /sys/class/kgsl/kgsl-3d0/version (Linux)

Verify Fix Applied:

Verify GPU driver version matches patched version in Qualcomm bulletin

📡 Detection & Monitoring

Log Indicators:

  • GPU driver crashes
  • Memory corruption errors in kernel logs
  • Abnormal GPU API calls

Network Indicators:

  • Unusual outbound connections following GPU driver crashes

SIEM Query:

source="kernel" AND ("GPU" OR "kgsl") AND ("crash" OR "corruption" OR "panic")

🔗 References

📤 Share & Export