Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202310-02 ] NVIDIA Drivers: Multiple Vulnerabi

    From glsamaker@gentoo.org@21:1/5 to All on Tue Oct 3 14:50:01 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202310-02
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: NVIDIA Drivers: Multiple Vulnerabilities
    Date: October 03, 2023
    Bugs: #764512, #784596, #803389, #832867, #845063, #866527, #881341, #884045, #903614
    ID: 202310-02

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in NVIDIA Drivers, the
    worst of which could result in root privilege escalation.

    Background
    ==========

    NVIDIA Drivers are NVIDIA's accelerated graphics driver.

    Affected packages
    =================

    Package Vulnerable Unaffected
    -------------------------- ------------ ------------- x11-drivers/nvidia-drivers < 470.182.03 >= 470.182.03

    Description
    ===========

    Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All NVIDIA Drivers 470 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-470.182.03:0/470"

    All NVIDIA Drivers 515 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-515.105.01:0/515"

    All NVIDIA Drivers 525 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-525.105.17:0/525"

    All NVIDIA Drivers 530 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-530.41.03:0/530"

    References
    ==========

    [ 1 ] CVE-2021-1052
    https://nvd.nist.gov/vuln/detail/CVE-2021-1052
    [ 2 ] CVE-2021-1053
    https://nvd.nist.gov/vuln/detail/CVE-2021-1053
    [ 3 ] CVE-2021-1056
    https://nvd.nist.gov/vuln/detail/CVE-2021-1056
    [ 4 ] CVE‑2021‑1076
    https://nvd.nist.gov/vuln/detail/CVE‑2021‑1076
    [ 5 ] CVE‑2021‑1077
    https://nvd.nist.gov/vuln/detail/CVE‑2021‑1077
    [ 6 ] CVE-2021-1090
    https://nvd.nist.gov/vuln/detail/CVE-2021-1090
    [ 7 ] CVE-2021-1093
    https://nvd.nist.gov/vuln/detail/CVE-2021-1093
    [ 8 ] CVE-2021-1094
    https://nvd.nist.gov/vuln/detail/CVE-2021-1094
    [ 9 ] CVE-2021-1095
    https://nvd.nist.gov/vuln/detail/CVE-2021-1095
    [ 10 ] CVE‑2022‑21813
    https://nvd.nist.gov/vuln/detail/CVE‑2022‑21813
    [ 11 ] CVE‑2022‑21814
    https://nvd.nist.gov/vuln/detail/CVE‑2022‑21814
    [ 12 ] CVE-2022-28181
    https://nvd.nist.gov/vuln/detail/CVE-2022-28181
    [ 13 ] CVE-2022-28183
    https://nvd.nist.gov/vuln/detail/CVE-2022-28183
    [ 14 ] CVE-2022-28184
    https://nvd.nist.gov/vuln/detail/CVE-2022-28184
    [ 15 ] CVE-2022-28185
    https://nvd.nist.gov/vuln/detail/CVE-2022-28185
    [ 16 ] CVE-2022-31607
    https://nvd.nist.gov/vuln/detail/CVE-2022-31607
    [ 17 ] CVE-2022-31608
    https://nvd.nist.gov/vuln/detail/CVE-2022-31608
    [ 18 ] CVE-2022-31615
    https://nvd.nist.gov/vuln/detail/CVE-2022-31615
    [ 19 ] CVE‑2022‑34665
    https://nvd.nist.gov/vuln/detail/CVE‑2022‑34665
    [ 20 ] CVE-2022-34666
    https://nvd.nist.gov/vuln/detail/CVE-2022-34666
    [ 21 ] CVE-2022-34670
    https://nvd.nist.gov/vuln/detail/CVE-2022-34670
    [ 22 ] CVE-2022-34673
    https://nvd.nist.gov/vuln/detail/CVE-2022-34673
    [ 23 ] CVE-2022-34674
    https://nvd.nist.gov/vuln/detail/CVE-2022-34674
    [ 24 ] CVE-2022-34676
    https://nvd.nist.gov/vuln/detail/CVE-2022-34676
    [ 25 ] CVE-2022-34677
    https://nvd.nist.gov/vuln/detail/CVE-2022-34677
    [ 26 ] CVE-2022-34678
    https://nvd.nist.gov/vuln/detail/CVE-2022-34678
    [ 27 ] CVE-2022-34679
    https://nvd.nist.gov/vuln/detail/CVE-2022-34679
    [ 28 ] CVE-2022-34680
    https://nvd.nist.gov/vuln/detail/CVE-2022-34680
    [ 29 ] CVE-2022-34682
    https://nvd.nist.gov/vuln/detail/CVE-2022-34682
    [ 30 ] CVE-2022-34684
    https://nvd.nist.gov/vuln/detail/CVE-2022-34684
    [ 31 ] CVE-2022-42254
    https://nvd.nist.gov/vuln/detail/CVE-2022-42254
    [ 32 ] CVE-2022-42255
    https://nvd.nist.gov/vuln/detail/CVE-2022-42255
    [ 33 ] CVE-2022-42256
    https://nvd.nist.gov/vuln/detail/CVE-2022-42256
    [ 34 ] CVE-2022-42257
    https://nvd.nist.gov/vuln/detail/CVE-2022-42257
    [ 35 ] CVE-2022-42258
    https://nvd.nist.gov/vuln/detail/CVE-2022-42258
    [ 36 ] CVE-2022-42259
    https://nvd.nist.gov/vuln/detail/CVE-2022-42259
    [ 37 ] CVE-2022-42260
    https://nvd.nist.gov/vuln/detail/CVE-2022-42260
    [ 38 ] CVE-2022-42261
    https://nvd.nist.gov/vuln/detail/CVE-2022-42261
    [ 39 ] CVE-2022-42263
    https://nvd.nist.gov/vuln/detail/CVE-2022-42263
    [ 40 ] CVE-2022-42264
    https://nvd.nist.gov/vuln/detail/CVE-2022-42264
    [ 41 ] CVE-2022-42265
    https://nvd.nist.gov/vuln/detail/CVE-2022-42265
    [ 42 ] CVE-2023-0180
    https://nvd.nist.gov/vuln/detail/CVE-2023-0180
    [ 43 ] CVE-2023-0181
    https://nvd.nist.gov/vuln/detail/CVE-2023-0181
    [ 44 ] CVE-2023-0183
    https://nvd.nist.gov/vuln/detail/CVE-2023-0183
    [ 45 ] CVE-2023-0184
    https://nvd.nist.gov/vuln/detail/CVE-2023-0184
    [ 46 ] CVE-2023-0185
    https://nvd.nist.gov/vuln/detail/CVE-2023-0185
    [ 47 ] CVE-2023-0187
    https://nvd.nist.gov/vuln/detail/CVE-2023-0187
    [ 48 ] CVE-2023-0188
    https://nvd.nist.gov/vuln/detail/CVE-2023-0188
    [ 49 ] CVE-2023-0189
    https://nvd.nist.gov/vuln/detail/CVE-2023-0189
    [ 50 ] CVE-2023-0190
    https://nvd.nist.gov/vuln/detail/CVE-2023-0190
    [ 51 ] CVE-2023-0191
    https://nvd.nist.gov/vuln/detail/CVE-2023-0191
    [ 52 ] CVE-2023-0194
    https://nvd.nist.gov/vuln/detail/CVE-2023-0194
    [ 53 ] CVE-2023-0195
    https://nvd.nist.gov/vuln/detail/CVE-2023-0195
    [ 54 ] CVE-2023-0198
    https://nvd.nist.gov/vuln/detail/CVE-2023-0198
    [ 55 ] CVE-2023-0199
    https://nvd.nist.gov/vuln/detail/CVE-2023-0199

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202310-02

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmUcDNMACgkQFMQkOaVy +9nKBA//R/U+9inTlN8yrUuAo46ZzwhWWm700uGDNEeJv5fggO1WhVTKk7K1vsLf wqwIVxLngXff3oSOtnjOwH91Aw3GzqvIZPiSjN2DQ28sVd/mS+pjjZ77QGLskdIq uAN3uhCqRh+47qGXbWHHDx9hdwgNifT8V1y8BDHlw0jkTYKk3RiYbw9Bpi3VW/6M ofhpmJ2gWAwVjkl8vuEhpE9GVstmJyIWe5arha0B+MOQ8QDw/U1sHJ/AZ5HfGZcI 1PFW99MDMwBufO3rzMJlzmLRVJZSClBJBxZ431yP7RFzwBKW3wtWnPFGyLyqLLfA 8bGabcPZnvWVW+fXLU+/978Ad7YXjzr43pH33jZfAbAkiaEz3kKYkkb3N3SpwZff ed6X9n3sUEN3xxLuBVxNN3o6T3y2+adTtPFNgigX7NE029UlYb+xS8jEc+VYnUg6 3rXhgysdu/o3wyfbo08bXsbzBseASRU6vKyLcBD4t1ajlYYY70EvY5Kb6DIXUkC3 ancYLupbHsFmQdUoUBaHgLUw5uu6lJzwiJL2BypO46ksgBebE+D1C6sdXu/Qrk/8 KNytAs9xCmVZ37G3K2LiTLv/QQEt77TQg64DQORC3+rN3zI99x1sw/BREzX9ubwo 9bkDk54KLN9Om5sEzSj5+l3B0s+ANDCH9NIRVGdN4qkEiewU7hw=
    =hQaA
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (2 / 14)
    Uptime: 152:18:53
    Calls: 10,383
    Files: 14,054
    Messages: 6,417,816

© >>> Magnum BBS <<<, 2025