PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://www.hertzbleed.com/gpu.zip/ | technical description |
https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf | exploit |
https://github.com/UT-Security/gpu-zip | third party advisory |
https://www.w3.org/TR/filter-effects-1/ | exploit |
https://blog.imaginationtech.com/reducing-bandwidth-pvric/ | press/media coverage |
https://blog.imaginationtech.com/introducing-pvric4-taking-image-compression-to-the-next-level/ | press/media coverage |
https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/ | third party advisory press/media coverage |
https://news.ycombinator.com/item?id=37663159 | issue tracking |
https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/ | press/media coverage |