aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2023/dla-3418.wml
blob: c909f5825c9abe38e096e5cfc06351e615cc9469 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>NVIDIA has released a software security update for the NVIDIA GPU Display
Driver R390 linux driver branch. This update addresses issues that may lead to
denial of service, escalation of privileges, information disclosure, data
tampering or undefined behavior.</p>

<p></p>

<ul>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34670">CVE-2022-34670</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer handler, where an unprivileged regular user can
    cause truncation errors when casting a primitive to a primitive of
    smaller size causes data to be lost in the conversion, which may
    lead to denial of service or information disclosure.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34674">CVE-2022-34674</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer handler, where a helper function maps more
    physical pages than were requested, which may lead to undefined
    behavior or an information leak.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34675">CVE-2022-34675</a>

    <p>NVIDIA Display Driver for Linux contains a vulnerability in the
    Virtual GPU Manager, where it does not check the return value from a
    null-pointer dereference, which may lead to denial of service.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34677">CVE-2022-34677</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer handler, where an unprivileged regular user can
    cause an integer to be truncated, which may lead to denial of
    service or data tampering.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34680">CVE-2022-34680</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer handler, where an integer truncation can lead to
    an out-of-bounds read, which may lead to denial of service.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42257">CVE-2022-42257</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer (nvidia.ko), where an integer overflow may lead to
    information disclosure, data tampering or denial of service.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42258">CVE-2022-42258</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer (nvidia.ko), where an integer overflow may lead to
    denial of service, data tampering, or information disclosure.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42259">CVE-2022-42259</a>

    <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
    kernel mode layer (nvidia.ko), where an integer overflow may lead to
    denial of service.</p></li>

</ul>

<p>For Debian 10 buster, these problems have been fixed in version
390.157-1~deb10u1.</p>

<p>We recommend that you upgrade your nvidia-graphics-drivers-legacy-390xx packages.</p>

<p>For the detailed security status of
nvidia-graphics-drivers-legacy-390xx please refer to its security
tracker page at:
<a href="https://security-tracker.debian.org/tracker/nvidia-graphics-drivers-legacy-390xx">https://security-tracker.debian.org/tracker/nvidia-graphics-drivers-legacy-390xx</a></p>

<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2023/dla-3418.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy