Qualcomm Adreno GPU Ringbuffer Corruption / Protected Mode Bypass – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on September 9th, 2020 📆 | 4405 Views ⚑

0

Qualcomm Adreno GPU Ringbuffer Corruption / Protected Mode Bypass

The Qualcomm Adreno GPU shares a global mapping called a “scratch” buffer with the Adreno KGSL kernel driver. The contents of the scratch buffer can be overwritten by untrusted GPU commands. This results in a logic error in the Adreno driver’s ringbuffer allocation code, which can be used to corrupt ringbuffer data. A race condition exists between the ringbuffer corruption and a GPU context switch, and this results in a bypass of the GPU protected mode setting. This ultimately means that an attacker can read and write arbitrary physical addresses from userland by running GPU commands while protected mode disabled, which results in arbitrary kernel code execution.
Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...