Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-4299 Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 24 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 22 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
Description Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory.
Title GPU DDK - rgxfw_write_robustness_buffer allows arbitrary catreg set mapping
Weaknesses CWE-270
References

cve-icon MITRE

Status: PUBLISHED

Assigner: imaginationtech

Published:

Updated: 2025-02-24T16:22:17.595Z

Reserved: 2024-09-16T13:20:45.924Z

Link: CVE-2024-46975

cve-icon Vulnrichment

Updated: 2025-02-24T16:21:44.856Z

cve-icon NVD

Status : Received

Published: 2025-02-22T15:15:10.377

Modified: 2025-02-24T17:15:13.257

Link: CVE-2024-46975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.