OSG-SEC-2026-04-06 HIGH GPUBreach Vulnerability
Dear OSG Security Contacts,
Recent research (GPUBreach) demonstrates that specially crafted GPU workloads can induce bit flips in GDDR6 memory, potentially corrupting GPU page tables. Under certain conditions, this could be chained with GPU driver vulnerabilities to achieve host-level (root) compromise.
IMPACTED VERSIONS:
GPUs using GDDR6 memory (demonstrated on NVIDIA RTX A6000; other GDDR6 GPUs may also be susceptible).
WHAT ARE THE VULNERABILITIES:
GPUBreach is a research-demonstrated technique in which specially crafted GPU workloads induce bit flips (Rowhammer) in GDDR6 memory, potentially corrupting GPU page tables. This may allow:
Unauthorized GPU memory access, including possible cross-process data exposure
In combination with GPU driver vulnerabilities, potential escalation to root access on the host system
In demonstrated scenarios, attackers may achieve root shell access, resulting in full system compromise
WHAT YOU SHOULD DO:
- Avoid multi-tenant GPU sharing to reduce the likelihood of exploitation
- Keep GPU drivers up to date to mitigate potential escalation paths
- Enable ECC on GPUs (if supported) to reduce the probability of successful bit flips
- Limit and monitor GPU access where feasible
- Monitor vendor advisories for updates, as patch availability is not yet confirmed
REFERENCES:
[1] https://gpubreach.ca/
[2] https://www.nvidia.com/en-us/security/
[3] https://radar.offseq.com/threat/gpubreach-root-shell-access-achieved-via-gpu-rowha-1215a777
Please contact the OSG security team at [email protected] if you have any questions or concerns.
OSG Security Team