Software installed and run as a non-privileged user can trigger the GPU kernel driver to write to arbitrary read-only system files that have been mapped into application memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 28 Dec 2024 05:15:00 +0000

Type Values Removed Values Added
Description Software installed and run as a non-privileged user can trigger the GPU kernel driver to write to arbitrary read-only system files that have been mapped into application memory.
Title GPU DDK - Security: Exploitable PVRSRVBridgePhysmemWrapExtMem may lead to overwrite read-only file/memory (e.g. libc.so)
Weaknesses CWE-280
References

cve-icon MITRE

Status: PUBLISHED

Assigner: imaginationtech

Published:

Updated: 2024-12-28T16:38:31.462Z

Reserved: 2024-08-15T08:21:31.533Z

Link: CVE-2024-43705

cve-icon Vulnrichment

Updated: 2024-12-28T16:38:26.219Z

cve-icon NVD

Status : Received

Published: 2024-12-28T05:15:07.360

Modified: 2024-12-28T17:15:07.190

Link: CVE-2024-43705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.