CVE-2024-46973

7.8 HIGH

📋 TL;DR

This vulnerability allows non-privileged users to trigger use-after-free kernel exceptions through improper GPU system calls, potentially leading to privilege escalation or system crashes. It affects systems with Imagination Technologies GPU drivers. The risk is highest for multi-user systems where untrusted users can run GPU-accelerated applications.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; check vendor advisory for exact affected versions
Operating Systems: Linux, Android, Other systems using Imagination GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where non-privileged users can execute GPU-accelerated applications. Virtualization environments with GPU passthrough may be particularly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation to kernel-level access, allowing complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing a standard user to gain root/admin privileges, system instability, or denial of service through kernel panics.

🟢

If Mitigated

Limited to denial of service through application crashes if proper sandboxing and privilege separation are enforced.

🌐 Internet-Facing: LOW - Requires local access to execute GPU system calls, not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user with GPU access can potentially exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of GPU driver internals and kernel memory management. Local access with ability to run GPU applications is necessary.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Imagination Technologies security advisory for specific patched driver versions

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: Yes

Instructions:

1. Visit Imagination Technologies security advisory. 2. Identify affected driver version. 3. Download and install patched GPU driver from vendor. 4. Reboot system to load new driver.

🔧 Temporary Workarounds

Restrict GPU access

linux

Limit GPU device access to privileged users only

chmod 600 /dev/dri/renderD*
chown root:root /dev/dri/renderD*

Disable GPU acceleration

all

Prevent non-privileged applications from using GPU features

🧯 If You Can't Patch

  • Implement strict user privilege separation and limit GPU device access to trusted users only
  • Monitor system logs for unusual GPU driver activity or kernel panic events

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Imagination Technologies advisory. Use 'modinfo' for kernel modules or vendor-specific version checks.

Check Version:

Check system-specific: 'modinfo imagination_gpu' or consult vendor documentation for version checking

Verify Fix Applied:

Verify installed GPU driver version matches patched version from vendor advisory and test GPU functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning GPU driver
  • System logs showing privilege escalation attempts
  • GPU driver crash reports in dmesg or system logs

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("GPU" OR "dri" OR "render") AND ("panic" OR "Oops" OR "use-after-free")

🔗 References

📤 Share & Export