CVE-2024-47891
📋 TL;DR
This vulnerability allows non-privileged software to make improper GPU system calls that trigger use-after-free kernel exceptions. It affects systems using Imagination Technologies GPU drivers where unprivileged users can execute code. The vulnerability could lead to kernel memory corruption and potential privilege escalation.
💻 Affected Systems
- Imagination Technologies GPU drivers
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via kernel privilege escalation leading to complete control of the affected system
Likely Case
Local privilege escalation allowing attackers to gain elevated privileges on the system
If Mitigated
Denial of service or system instability if exploitation attempts are blocked
🎯 Exploit Status
Requires local access and ability to execute GPU system calls; kernel exploitation requires specific timing and memory manipulation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Imagination Technologies advisory for specific patched versions
Vendor Advisory: https://www.imaginationtech.com/gpu-driver-vulnerabilities/
Restart Required: No
Instructions:
1. Visit Imagination Technologies advisory page 2. Identify affected driver versions 3. Download and install patched GPU drivers 4. Verify driver update completed successfully
🔧 Temporary Workarounds
Restrict GPU access
LinuxLimit non-privileged user access to GPU system calls and device files
chmod 600 /dev/dri/renderD*
chmod 600 /dev/dri/card*
🧯 If You Can't Patch
- Implement strict access controls to prevent non-privileged users from executing GPU operations
- Monitor system logs for unusual GPU-related activity and kernel exceptions
🔍 How to Verify
Check if Vulnerable:
Check GPU driver version against Imagination Technologies advisory; examine if non-privileged users have GPU device access
Check Version:
modinfo -F version [gpu_driver_module_name] or check /sys/class/drm/card*/device/uevent
Verify Fix Applied:
Verify GPU driver version matches patched version from vendor advisory; test that use-after-free conditions no longer occur
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- GPU driver crash reports
- Use-after-free kernel warnings in dmesg
- Unusual GPU system call patterns
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND ("use-after-free" OR "GPU" OR "drm" OR "kernel panic")