GPUBreach bypasses IOMMU on GDDR6-based NVIDIA GPUs

Researchers from the University of Toronto describe GPUBreach, a rowhammer attack against GDDR6-based NVIDIA GPUs that can bypass IOMMU protections. The technique enables CPU-side privilege escalation by abusing trusted GPU driver behavior on the host system.

Researchers from the University of Toronto have introduced GPUBreach, a rowhammer attack targeting GDDR6-based NVIDIA GPUs that can bypass IOMMU and enable CPU-side privilege escalation. The attack stands apart from earlier GDDRHammer and GeForge techniques, which were largely mitigated by enabling IOMMU through the BIOS to limit the memory regions a GPU can access on the host system.

In typical server, workstation, and PC configurations, IOMMU restricts the GPU’s access to the CPU’s physical addresses and blocks the direct memory access patterns used in conventional DMA-based attacks. GPUBreach operates through a different path. Rather than relying on unrestricted access to host memory, it targets memory-safe bugs in the GPU driver and corrupts them while the GPU remains confined to driver-assigned buffers.

When IOMMU limits direct memory access to permitted buffers, the exploit corrupts metadata within those buffers. This causes the driver, which has kernel privileges enabled on the CPU host, to perform out-of-band writes to the buffer, effectively bypassing the protection IOMMU is designed to provide. Because this trust model is built into the kernel by default and the GPU driver is treated as one of the operating system’s most trusted components, corrupted metadata can turn the driver itself into the mechanism for the bypass.

The result is a more serious outcome than earlier rowhammer attacks against these GPUs. GPUBreach grants an attacker full root privilege escalation, shifting the impact from memory corruption alone to direct compromise of the host CPU side. That makes the attack notable not just for bypassing IOMMU, but for exploiting the interaction between GPU memory behavior and privileged driver logic on the host.

72

Impact Score

HMRC signs £175m Quantexa deal for fraud detection

HM Revenue and Customs has signed a £175 million, 10-year agreement with Quantexa to unify fragmented data and strengthen fraud detection. The deployment is designed to automate routine work while keeping decisions transparent, auditable and subject to human approval.

Us supercomputers test new Artificial Intelligence chip suppliers

Sandia National Laboratories is evaluating chips from Israeli startup NextSilicon as major chipmakers shift their roadmaps toward Artificial Intelligence. The move reflects growing concern that mainstream processors are deprioritizing the scientific computing features government labs still need.

EU Artificial Intelligence Act amendments delay some deadlines and add new bans

A provisional Digital Omnibus on Artificial Intelligence would push back several EU Artificial Intelligence Act deadlines, refine how the law interacts with sector rules, and introduce new prohibited practices. The package also expands limited bias-testing allowances and strengthens centralized oversight for some high-impact systems.

Qwen 3.5 raises concerns about censorship embedded in model weights

A technical analysis of Alibaba Cloud’s Qwen 3.5 points to political censorship circuits embedded directly in the model’s learned weights. The findings highlight operational, compliance, and product risks for startups building on third-party Artificial Intelligence models.

Laptop prices rise as memory shortages hit PCs

Laptop prices are climbing as memory makers redirect production toward data center demand driven by Artificial Intelligence. The squeeze is spreading beyond RAM to graphics memory and SSDs, raising costs across the PC market.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.