CVE-2024-46974

7.8 HIGH

📋 TL;DR

This vulnerability allows non-privileged software to improperly access Direct Memory Access (DMA) buffers, potentially leading to memory corruption or information disclosure. It affects systems using Imagination Technologies GPU drivers where DMA buffer operations are not properly restricted. Users running affected GPU drivers are at risk.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; check vendor advisory for exact affected versions
Operating Systems: Linux, Android, Other systems using Imagination GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where non-privileged users can run software that interacts with GPU DMA buffers. Virtualization environments may be particularly affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation to kernel-level access, allowing full system compromise, data theft, or persistent malware installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on the system, potentially accessing sensitive data or installing additional malware.

🟢

If Mitigated

Limited impact with proper user privilege separation and DMA buffer isolation, potentially only affecting the compromised user's data.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the target system.
🏢 Internal Only: MEDIUM - Internal attackers or malware with local execution could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of DMA buffer operations and driver internals. Local access or ability to execute code on target system is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Imagination Technologies advisory for specific patched versions

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: No

Instructions:

1. Visit Imagination Technologies advisory page. 2. Identify affected driver versions. 3. Download and install updated GPU drivers from official vendor sources. 4. Verify installation completes successfully.

🔧 Temporary Workarounds

Restrict GPU access

Linux

Limit non-privileged user access to GPU devices and DMA operations through system permissions

chmod 600 /dev/dri/*
setfacl -m u:root:rw- /dev/dri/*

🧯 If You Can't Patch

  • Implement strict user privilege separation to limit non-privileged software execution
  • Use security modules like SELinux or AppArmor to restrict DMA buffer operations

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Imagination Technologies advisory. Use 'modinfo' or driver version commands specific to your system.

Check Version:

glxinfo | grep 'OpenGL version' OR check /sys/module/ module parameters for GPU driver

Verify Fix Applied:

Verify installed GPU driver version matches or exceeds patched version from vendor advisory. Test DMA buffer access permissions.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing DMA buffer access violations
  • System logs with GPU driver error messages related to memory access

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("DMA" OR "buffer" OR "GPU") AND ("access denied" OR "violation" OR "corruption")

🔗 References

📤 Share & Export