CVE-2024-47891

7.8 HIGH

📋 TL;DR

This vulnerability allows non-privileged software to make improper GPU system calls that trigger use-after-free kernel exceptions. It affects systems using Imagination Technologies GPU drivers where unprivileged users can execute code. The vulnerability could lead to kernel memory corruption and potential privilege escalation.

💻 Affected Systems

Products:
  • Imagination Technologies GPU drivers
Versions: Specific versions not detailed in reference; check vendor advisory
Operating Systems: Linux-based systems using Imagination GPU drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Imagination GPU hardware and corresponding drivers; affects systems where non-privileged users can execute GPU operations

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via kernel privilege escalation leading to complete control of the affected system

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated privileges on the system

🟢

If Mitigated

Denial of service or system instability if exploitation attempts are blocked

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the target system
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this for privilege escalation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute GPU system calls; kernel exploitation requires specific timing and memory manipulation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Imagination Technologies advisory for specific patched versions

Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/

Restart Required: No

Instructions:

1. Visit Imagination Technologies advisory page 2. Identify affected driver versions 3. Download and install patched GPU drivers 4. Verify driver update completed successfully

🔧 Temporary Workarounds

Restrict GPU access

Linux

Limit non-privileged user access to GPU system calls and device files

chmod 600 /dev/dri/renderD*
chmod 600 /dev/dri/card*

🧯 If You Can't Patch

  • Implement strict access controls to prevent non-privileged users from executing GPU operations
  • Monitor system logs for unusual GPU-related activity and kernel exceptions

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Imagination Technologies advisory; examine if non-privileged users have GPU device access

Check Version:

modinfo -F version [gpu_driver_module_name] or check /sys/class/drm/card*/device/uevent

Verify Fix Applied:

Verify GPU driver version matches patched version from vendor advisory; test that use-after-free conditions no longer occur

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • GPU driver crash reports
  • Use-after-free kernel warnings in dmesg
  • Unusual GPU system call patterns

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("use-after-free" OR "GPU" OR "drm" OR "kernel panic")

🔗 References

📤 Share & Export