Buffer Oversight in NVIDIA GPU Display Driver for Linux
CVE-2023-0198

7.8HIGH

Summary

The NVIDIA GPU Display Driver for Linux contains a vulnerability in its kernel mode layer that exposes systems to risks including denial of service, information disclosure, and potential data tampering due to inadequate restrictions on memory buffer operations. This flaw allows attackers to manipulate data or disrupt service, emphasizing the need for timely security updates.

Affected Version(s)

vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), , NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM) All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.