CVE-2023-44216
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/09/2023
Last modified:
05/10/2023
Description
PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* | ||
cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_11:-:*:*:*:professional:*:*:* | ||
cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_11:-:*:*:*:home:*:*:* | ||
cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:nvidia:geforce_rtx_3060:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:-:*:*:*:pro:*:*:* | ||
cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:nvidia:geforce_rtx_2080_super:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:macos:13.1:*:*:*:*:*:*:* | ||
cpe:2.3:h:apple:m1_mac_mini:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/
- https://blog.imaginationtech.com/introducing-pvric4-taking-image-compression-to-the-next-level/
- https://blog.imaginationtech.com/reducing-bandwidth-pvric/
- https://github.com/UT-Security/gpu-zip
- https://news.ycombinator.com/item?id=37663159
- https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/
- https://www.hertzbleed.com/gpu.zip/
- https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf
- https://www.w3.org/TR/filter-effects-1/