Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-0090 (GCVE-0-2024-0090)
Vulnerability from cvelistv5
URL | Tags | ||
---|---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
nvidia | GPU display driver, vGPU software, and Cloud Gaming |
Version: All versions up to and including 17.1, 16.5, 13.10, and the April 2024 release |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "gpu_display_driver", "vendor": "nvidia", "versions": [ { "lessThanOrEqual": "17.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "16.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "13.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:nvidia:virtual_gpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "virtual_gpu", "vendor": "nvidia", "versions": [ { "lessThanOrEqual": "16.5", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "17.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "13.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:nvidia:cloud_gaming:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cloud_gaming", "vendor": "nvidia", "versions": [ { "lessThanOrEqual": "13.10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "17.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "16.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-0090", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-15T03:55:33.792Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:15.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GPU display driver, vGPU software, and Cloud Gaming", "vendor": "nvidia", "versions": [ { "status": "affected", "version": "All versions up to and including 17.1, 16.5, 13.10, and the April 2024 release" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." } ], "value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Code execution, denial of service, escalation of privileges, information disclosure, data tampering" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-13T21:23:28.800Z", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE" } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2024-0090", "datePublished": "2024-06-13T21:23:28.800Z", "dateReserved": "2023-12-02T00:41:59.934Z", "dateUpdated": "2024-08-01T17:41:15.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-0090\",\"sourceIdentifier\":\"psirt@nvidia.com\",\"published\":\"2024-06-13T22:15:12.170\",\"lastModified\":\"2024-11-21T08:45:52.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\"},{\"lang\":\"es\",\"value\":\"El controlador de GPU NVIDIA para Windows y Linux contiene una vulnerabilidad en la que un usuario puede provocar una escritura fuera de los l\u00edmites. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, denegaci\u00f3n de servicio, escalada de privilegios, divulgaci\u00f3n de informaci\u00f3n y manipulaci\u00f3n de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"470\",\"versionEndExcluding\":\"475.06\",\"matchCriteriaId\":\"32EB51D2-1F34-4D1D-8B23-4029E350140F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"535\",\"versionEndExcluding\":\"538.67\",\"matchCriteriaId\":\"6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"550\",\"versionEndExcluding\":\"552.55\",\"matchCriteriaId\":\"5C44719A-BFA0-479C-97D4-26301F4E2C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"555\",\"versionEndExcluding\":\"555.99\",\"matchCriteriaId\":\"940E9BEA-9FBE-4E3B-A79D-111C52653E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DE5CC2-3787-4605-8EFA-77590E36E960\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333646B0-AAD5-4DD7-8940-6334D0A8E77C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DB9FB5-E115-4E96-98F8-3FAFAC120E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C63EA1-8719-4F5C-922A-C77ED4CEF7C7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1ED5DE2-7677-4F38-8177-3BF0B3D03A09\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D135086F-CA5E-4242-ACBA-C3AC82F4BE03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*\",\"versionStartIncluding\":\"470\",\"versionEndExcluding\":\"470.256.02\",\"matchCriteriaId\":\"D66C0B72-0A3F-4D61-8BF5-B0BED03014E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*\",\"versionStartIncluding\":\"535\",\"versionEndExcluding\":\"535.180.01\",\"matchCriteriaId\":\"3EC43E03-3909-4AB5-A9FD-198E55167AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*\",\"versionStartIncluding\":\"550\",\"versionEndExcluding\":\"550.90.07\",\"matchCriteriaId\":\"9BEA1462-AA33-4ED9-91CD-737525B9E2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*\",\"versionStartIncluding\":\"555\",\"versionEndExcluding\":\"555.52.04\",\"matchCriteriaId\":\"B0AB9E55-DB20-4FA4-8900-61C224514B49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DE5CC2-3787-4605-8EFA-77590E36E960\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333646B0-AAD5-4DD7-8940-6334D0A8E77C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DB9FB5-E115-4E96-98F8-3FAFAC120E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C63EA1-8719-4F5C-922A-C77ED4CEF7C7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D135086F-CA5E-4242-ACBA-C3AC82F4BE03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.11\",\"matchCriteriaId\":\"44592EFE-8D69-4B7F-B089-A612B5217199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"16.6\",\"matchCriteriaId\":\"A5CBF021-7A5A-412A-BBC2-EB75C6343BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.2\",\"matchCriteriaId\":\"2DFC08A7-3121-4D8F-88A6-9304C173A439\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"019A2188-0877-45DE-8512-F0BF70DD179C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE5C32-E060-44BA-8C13-3D73204191EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C8B1C5-6401-45F9-8D3E-47E32067F428\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4A22C5-B3E1-4106-997C-D1C845F2C1EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"555.99\",\"matchCriteriaId\":\"5C8E669A-9DE1-42BD-94B1-98437BB66002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"555.52.04\",\"matchCriteriaId\":\"699C6D58-B26C-4F27-A1BD-A1A80E0D6A36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C8B1C5-6401-45F9-8D3E-47E32067F428\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4A22C5-B3E1-4106-997C-D1C845F2C1EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.2\",\"matchCriteriaId\":\"6907E2B7-9C1A-4964-A6D3-CF16E376B91E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF31A34-9492-498F-8A78-F233C0075CB2\"}]}]}],\"references\":[{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5551\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5551\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T17:41:15.818Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-0090\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-14T19:03:39.890811Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:nvidia:gpu_display_driver:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"gpu_display_driver\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"16.5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.10\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:nvidia:virtual_gpu:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"virtual_gpu\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"16.5\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.10\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:nvidia:cloud_gaming:-:*:*:*:*:*:*:*\"], \"vendor\": \"nvidia\", \"product\": \"cloud_gaming\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.10\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"16.5\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-14T19:08:05.546Z\"}}], \"cna\": {\"title\": \"CVE\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"Code execution, denial of service, escalation of privileges, information disclosure, data tampering\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"nvidia\", \"product\": \"GPU display driver, vGPU software, and Cloud Gaming\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions up to and including 17.1, 16.5, 13.10, and the April 2024 release\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5551\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.\", \"base64\": true}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787\"}]}], \"providerMetadata\": {\"orgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"shortName\": \"nvidia\", \"dateUpdated\": \"2024-06-13T21:23:28.800Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-0090\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T17:41:15.818Z\", \"dateReserved\": \"2023-12-02T00:41:59.934Z\", \"assignerOrgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"datePublished\": \"2024-06-13T21:23:28.800Z\", \"assignerShortName\": \"nvidia\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
CERTFR-2024-AVI-0496
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
SUSE | Basesystem Module | SUSE Real Time Module 15-SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
SUSE | Public Cloud Module | Public Cloud Module 15-SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | Basesystem Module | SUSE Manager Retail Branch Server 4.3 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 11 SP4 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 12 SP5 | ||
SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP5 | ||
SUSE | Basesystem Module | SUSE Manager Server 4.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Real Time 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | Basesystem Module | SUSE Manager Proxy 4.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | Basesystem Module | SUSE Linux Enterprise Server for SAP Applications 15 SP4 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Real Time Module 15-SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP5", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.3", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Public Cloud Module 15-SP5", "product": { "name": "Public Cloud Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.3", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.3", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Real Time Module 15-SP5", "product": { "name": "SUSE Real Time Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.3", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.3", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2021-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3743" }, { "name": "CVE-2021-43056", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43056" }, { "name": "CVE-2021-42327", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42327" }, { "name": "CVE-2021-39698", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39698" }, { "name": "CVE-2022-1195", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1195" }, { "name": "CVE-2022-20132", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20132" }, { "name": "CVE-2023-1829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1829" }, { "name": "CVE-2023-2176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2176" }, { "name": "CVE-2023-42755", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42755" }, { "name": "CVE-2023-4244", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4244" }, { "name": "CVE-2023-6531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6531" }, { "name": "CVE-2023-0160", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160" }, { "name": "CVE-2023-47233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47233" }, { "name": "CVE-2024-26625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625" }, { "name": "CVE-2024-26581", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26581" }, { "name": "CVE-2024-26597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26597" }, { "name": "CVE-2024-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201" }, { "name": "CVE-2021-47104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47104" }, { "name": "CVE-2023-52591", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591" }, { "name": "CVE-2021-46933", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46933" }, { "name": "CVE-2024-26775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26775" }, { "name": "CVE-2024-26748", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26748" }, { "name": "CVE-2024-26801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801" }, { "name": "CVE-2024-26752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26752" }, { "name": "CVE-2023-52618", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52618" }, { "name": "CVE-2024-26764", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26764" }, { "name": "CVE-2024-26679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26679" }, { "name": "CVE-2024-26777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26777" }, { "name": "CVE-2024-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26700" }, { "name": "CVE-2024-26791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26791" }, { "name": "CVE-2024-26788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26788" }, { "name": "CVE-2024-26643", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26643" }, { "name": "CVE-2024-26698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26698" }, { "name": "CVE-2024-26778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26778" }, { "name": "CVE-2024-26715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26715" }, { "name": "CVE-2024-26742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26742" }, { "name": "CVE-2021-46955", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46955" }, { "name": "CVE-2024-0639", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0639" }, { "name": "CVE-2021-47171", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47171" }, { "name": "CVE-2023-52581", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52581" }, { "name": "CVE-2024-27393", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27393" }, { "name": "CVE-2024-26870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26870" }, { "name": "CVE-2024-26839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26839" }, { "name": "CVE-2024-27047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27047" }, { "name": "CVE-2024-27028", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27028" }, { "name": "CVE-2024-26989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26989" }, { "name": "CVE-2024-26840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26840" }, { "name": "CVE-2023-52644", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52644" }, { "name": "CVE-2024-26931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26931" }, { "name": "CVE-2024-26846", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26846" }, { "name": "CVE-2024-26958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26958" }, { "name": "CVE-2024-27008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27008" }, { "name": "CVE-2024-26907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26907" }, { "name": "CVE-2024-26925", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26925" }, { "name": "CVE-2024-26934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26934" }, { "name": "CVE-2024-26957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26957" }, { "name": "CVE-2024-26889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26889" }, { "name": "CVE-2024-27000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27000" }, { "name": "CVE-2024-26880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26880" }, { "name": "CVE-2024-27388", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27388" }, { "name": "CVE-2024-26974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26974" }, { "name": "CVE-2024-26984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26984" }, { "name": "CVE-2024-27059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27059" }, { "name": "CVE-2024-26996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26996" }, { "name": "CVE-2024-27051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27051" }, { "name": "CVE-2024-27073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27073" }, { "name": "CVE-2024-26999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26999" }, { "name": "CVE-2024-26874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26874" }, { "name": "CVE-2024-27004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27004" }, { "name": "CVE-2024-27052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052" }, { "name": "CVE-2024-26979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26979" }, { "name": "CVE-2024-26920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26920" }, { "name": "CVE-2024-27074", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27074" }, { "name": "CVE-2023-52650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52650" }, { "name": "CVE-2024-27001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27001" }, { "name": "CVE-2024-26894", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26894" }, { "name": "CVE-2024-26852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26852" }, { "name": "CVE-2024-26939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26939" }, { "name": "CVE-2024-26859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26859" }, { "name": "CVE-2024-26994", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26994" }, { "name": "CVE-2023-52642", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52642" }, { "name": "CVE-2024-26877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26877" }, { "name": "CVE-2024-26937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26937" }, { "name": "CVE-2024-26997", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26997" }, { "name": "CVE-2024-26922", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26922" }, { "name": "CVE-2024-27076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27076" }, { "name": "CVE-2024-26862", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26862" }, { "name": "CVE-2024-27077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27077" }, { "name": "CVE-2024-27078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27078" }, { "name": "CVE-2024-27053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27053" }, { "name": "CVE-2024-27075", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27075" }, { "name": "CVE-2024-27045", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27045" }, { "name": "CVE-2024-26988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26988" }, { "name": "CVE-2024-26916", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26916" }, { "name": "CVE-2023-52643", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52643" }, { "name": "CVE-2024-26829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26829" }, { "name": "CVE-2024-27062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27062" }, { "name": "CVE-2024-27042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27042" }, { "name": "CVE-2022-48703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48703" }, { "name": "CVE-2021-47206", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47206" }, { "name": "CVE-2024-27054", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27054" }, { "name": "CVE-2022-48702", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48702" }, { "name": "CVE-2022-48686", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48686" }, { "name": "CVE-2022-48701", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48701" }, { "name": "CVE-2021-47162", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47162" }, { "name": "CVE-2022-48694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48694" }, { "name": "CVE-2022-48688", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48688" }, { "name": "CVE-2022-48650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48650" }, { "name": "CVE-2022-48634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48634" }, { "name": "CVE-2022-48672", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48672" }, { "name": "CVE-2022-48693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48693" }, { "name": "CVE-2022-48652", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48652" }, { "name": "CVE-2021-47192", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47192" }, { "name": "CVE-2022-48671", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48671" }, { "name": "CVE-2022-48662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48662" }, { "name": "CVE-2021-47131", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47131" }, { "name": "CVE-2024-27072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27072" }, { "name": "CVE-2023-52646", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52646" }, { "name": "CVE-2021-47200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47200" }, { "name": "CVE-2024-26933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26933" }, { "name": "CVE-2022-48700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48700" }, { "name": "CVE-2022-48687", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48687" }, { "name": "CVE-2024-26929", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26929" }, { "name": "CVE-2021-47074", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47074" }, { "name": "CVE-2023-52653", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52653" }, { "name": "CVE-2022-48695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48695" }, { "name": "CVE-2022-48704", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48704" }, { "name": "CVE-2022-48692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48692" }, { "name": "CVE-2022-48636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48636" }, { "name": "CVE-2024-26739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739" }, { "name": "CVE-2022-48675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48675" }, { "name": "CVE-2022-48673", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48673" }, { "name": "CVE-2022-48697", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48697" }, { "name": "CVE-2022-48699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48699" }, { "name": "CVE-2024-26876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26876" }, { "name": "CVE-2024-26915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26915" }, { "name": "CVE-2021-47113", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47113" }, { "name": "CVE-2022-48632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48632" }, { "name": "CVE-2021-47188", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47188" }, { "name": "CVE-2024-26930", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26930" }, { "name": "CVE-2024-26828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26828" }, { "name": "CVE-2022-48669", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48669" }, { "name": "CVE-2024-26919", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26919" }, { "name": "CVE-2024-26964", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26964" }, { "name": "CVE-2024-26900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26900" }, { "name": "CVE-2024-27398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27398" }, { "name": "CVE-2024-27399", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27399" }, { "name": "CVE-2024-27401", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27401" }, { "name": "CVE-2024-35947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35947" }, { "name": "CVE-2024-36940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36940" }, { "name": "CVE-2024-36941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941" }, { "name": "CVE-2024-36950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36950" }, { "name": "CVE-2024-36954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36954" }, { "name": "CVE-2024-36959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36959" }, { "name": "CVE-2020-36788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36788" }, { "name": "CVE-2021-4148", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4148" }, { "name": "CVE-2021-47220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47220" }, { "name": "CVE-2021-47227", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47227" }, { "name": "CVE-2021-47228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47228" }, { "name": "CVE-2021-47229", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47229" }, { "name": "CVE-2021-47230", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47230" }, { "name": "CVE-2021-47231", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231" }, { "name": "CVE-2021-47235", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47235" }, { "name": "CVE-2021-47236", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236" }, { "name": "CVE-2021-47237", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47237" }, { "name": "CVE-2021-47238", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47238" }, { "name": "CVE-2021-47239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47239" }, { "name": "CVE-2021-47240", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47240" }, { "name": "CVE-2021-47241", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47241" }, { "name": "CVE-2021-47245", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47245" }, { "name": "CVE-2021-47246", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47246" }, { "name": "CVE-2021-47248", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47248" }, { "name": "CVE-2021-47249", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47249" }, { "name": "CVE-2021-47250", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47250" }, { "name": "CVE-2021-47252", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47252" }, { "name": "CVE-2021-47253", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47253" }, { "name": "CVE-2021-47254", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47254" }, { "name": "CVE-2021-47255", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47255" }, { "name": "CVE-2021-47258", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47258" }, { "name": "CVE-2021-47259", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47259" }, { "name": "CVE-2021-47260", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47260" }, { "name": "CVE-2021-47261", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47261" }, { "name": "CVE-2021-47263", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47263" }, { "name": "CVE-2021-47265", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47265" }, { "name": "CVE-2021-47267", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47267" }, { "name": "CVE-2021-47269", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47269" }, { "name": "CVE-2021-47270", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47270" }, { "name": "CVE-2021-47274", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47274" }, { "name": "CVE-2021-47275", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47275" }, { "name": "CVE-2021-47276", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47276" }, { "name": "CVE-2021-47277", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47277" }, { "name": "CVE-2021-47280", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47280" }, { "name": "CVE-2021-47281", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47281" }, { "name": "CVE-2021-47284", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47284" }, { "name": "CVE-2021-47285", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47285" }, { "name": "CVE-2021-47288", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47288" }, { "name": "CVE-2021-47289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47289" }, { "name": "CVE-2021-47296", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47296" }, { "name": "CVE-2021-47301", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47301" }, { "name": "CVE-2021-47302", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47302" }, { "name": "CVE-2021-47305", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47305" }, { "name": "CVE-2021-47307", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47307" }, { "name": "CVE-2021-47308", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47308" }, { "name": "CVE-2021-47310", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47310" }, { "name": "CVE-2021-47311", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47311" }, { "name": "CVE-2021-47314", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47314" }, { "name": "CVE-2021-47315", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47315" }, { "name": "CVE-2021-47319", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47319" }, { "name": "CVE-2021-47320", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47320" }, { "name": "CVE-2021-47321", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47321" }, { "name": "CVE-2021-47323", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47323" }, { "name": "CVE-2021-47324", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47324" }, { "name": "CVE-2021-47329", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47329" }, { "name": "CVE-2021-47330", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47330" }, { "name": "CVE-2021-47332", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47332" }, { "name": "CVE-2021-47333", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47333" }, { "name": "CVE-2021-47334", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47334" }, { "name": "CVE-2021-47337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47337" }, { "name": "CVE-2021-47338", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47338" }, { "name": "CVE-2021-47340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47340" }, { "name": "CVE-2021-47341", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47341" }, { "name": "CVE-2021-47343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47343" }, { "name": "CVE-2021-47344", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47344" }, { "name": "CVE-2021-47345", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47345" }, { "name": "CVE-2021-47347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47347" }, { "name": "CVE-2021-47348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47348" }, { "name": "CVE-2021-47350", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47350" }, { "name": "CVE-2021-47352", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47352" }, { "name": "CVE-2021-47353", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47353" }, { "name": "CVE-2021-47354", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47354" }, { "name": "CVE-2021-47355", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47355" }, { "name": "CVE-2021-47356", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47356" }, { "name": "CVE-2021-47357", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47357" }, { "name": "CVE-2021-47358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47358" }, { "name": "CVE-2021-47359", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47359" }, { "name": "CVE-2021-47360", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47360" }, { "name": "CVE-2021-47361", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47361" }, { "name": "CVE-2021-47362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47362" }, { "name": "CVE-2021-47363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47363" }, { "name": "CVE-2021-47364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47364" }, { "name": "CVE-2021-47365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47365" }, { "name": "CVE-2021-47366", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47366" }, { "name": "CVE-2021-47367", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47367" }, { "name": "CVE-2021-47368", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47368" }, { "name": "CVE-2021-47369", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47369" }, { "name": "CVE-2021-47370", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47370" }, { "name": "CVE-2021-47371", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47371" }, { "name": "CVE-2021-47372", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47372" }, { "name": "CVE-2021-47373", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47373" }, { "name": "CVE-2021-47374", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47374" }, { "name": "CVE-2021-47375", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47375" }, { "name": "CVE-2021-47376", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47376" }, { "name": "CVE-2021-47378", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47378" }, { "name": "CVE-2021-47379", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47379" }, { "name": "CVE-2021-47380", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47380" }, { "name": "CVE-2021-47381", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47381" }, { "name": "CVE-2021-47382", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47382" }, { "name": "CVE-2021-47383", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47383" }, { "name": "CVE-2021-47384", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47384" }, { "name": "CVE-2021-47385", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47385" }, { "name": "CVE-2021-47386", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47386" }, { "name": "CVE-2021-47387", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47387" }, { "name": "CVE-2021-47388", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47388" }, { "name": "CVE-2021-47389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47389" }, { "name": "CVE-2021-47390", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47390" }, { "name": "CVE-2021-47391", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47391" }, { "name": "CVE-2021-47392", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47392" }, { "name": "CVE-2021-47393", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47393" }, { "name": "CVE-2021-47394", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47394" }, { "name": "CVE-2021-47395", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47395" }, { "name": "CVE-2021-47396", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47396" }, { "name": "CVE-2021-47397", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47397" }, { "name": "CVE-2021-47398", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47398" }, { "name": "CVE-2021-47399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47399" }, { "name": "CVE-2021-47400", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47400" }, { "name": "CVE-2021-47401", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47401" }, { "name": "CVE-2021-47402", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47402" }, { "name": "CVE-2021-47403", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47403" }, { "name": "CVE-2021-47404", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47404" }, { "name": "CVE-2021-47405", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47405" }, { "name": "CVE-2021-47406", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47406" }, { "name": "CVE-2021-47407", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47407" }, { "name": "CVE-2021-47408", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47408" }, { "name": "CVE-2021-47409", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47409" }, { "name": "CVE-2021-47410", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47410" }, { "name": "CVE-2021-47412", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47412" }, { "name": "CVE-2021-47413", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47413" }, { "name": "CVE-2021-47414", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47414" }, { "name": "CVE-2021-47415", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47415" }, { "name": "CVE-2021-47416", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47416" }, { "name": "CVE-2021-47417", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47417" }, { "name": "CVE-2021-47418", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47418" }, { "name": "CVE-2021-47419", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47419" }, { "name": "CVE-2021-47420", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47420" }, { "name": "CVE-2021-47421", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47421" }, { "name": "CVE-2021-47422", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47422" }, { "name": "CVE-2021-47423", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47423" }, { "name": "CVE-2021-47424", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47424" }, { "name": "CVE-2021-47425", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47425" }, { "name": "CVE-2021-47426", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47426" }, { "name": "CVE-2021-47427", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47427" }, { "name": "CVE-2021-47428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47428" }, { "name": "CVE-2021-47429", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47429" }, { "name": "CVE-2021-47430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47430" }, { "name": "CVE-2021-47431", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47431" }, { "name": "CVE-2021-47433", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47433" }, { "name": "CVE-2021-47434", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47434" }, { "name": "CVE-2021-47435", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47435" }, { "name": "CVE-2021-47436", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47436" }, { "name": "CVE-2021-47437", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47437" }, { "name": "CVE-2021-47438", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47438" }, { "name": "CVE-2021-47439", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47439" }, { "name": "CVE-2021-47440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47440" }, { "name": "CVE-2021-47441", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47441" }, { "name": "CVE-2021-47442", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47442" }, { "name": "CVE-2021-47443", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47443" }, { "name": "CVE-2021-47444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47444" }, { "name": "CVE-2021-47445", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47445" }, { "name": "CVE-2021-47446", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47446" }, { "name": "CVE-2021-47447", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47447" }, { "name": "CVE-2021-47448", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47448" }, { "name": "CVE-2021-47449", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47449" }, { "name": "CVE-2021-47450", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47450" }, { "name": "CVE-2021-47451", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47451" }, { "name": "CVE-2021-47452", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47452" }, { "name": "CVE-2021-47453", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47453" }, { "name": "CVE-2021-47454", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47454" }, { "name": "CVE-2021-47455", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47455" }, { "name": "CVE-2021-47456", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47456" }, { "name": "CVE-2021-47457", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47457" }, { "name": "CVE-2021-47458", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47458" }, { "name": "CVE-2021-47459", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47459" }, { "name": "CVE-2021-47460", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47460" }, { "name": "CVE-2021-47461", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47461" }, { "name": "CVE-2021-47462", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47462" }, { "name": "CVE-2021-47463", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47463" }, { "name": "CVE-2021-47464", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47464" }, { "name": "CVE-2021-47465", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47465" }, { "name": "CVE-2021-47466", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47466" }, { "name": "CVE-2021-47467", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47467" }, { "name": "CVE-2021-47468", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47468" }, { "name": "CVE-2021-47469", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47469" }, { "name": "CVE-2021-47470", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47470" }, { "name": "CVE-2021-47471", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47471" }, { "name": "CVE-2021-47472", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47472" }, { "name": "CVE-2021-47473", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47473" }, { "name": "CVE-2021-47474", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47474" }, { "name": "CVE-2021-47475", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47475" }, { "name": "CVE-2021-47476", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47476" }, { "name": "CVE-2021-47477", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47477" }, { "name": "CVE-2021-47478", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47478" }, { "name": "CVE-2021-47479", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47479" }, { "name": "CVE-2021-47480", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47480" }, { "name": "CVE-2021-47481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47481" }, { "name": "CVE-2021-47482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47482" }, { "name": "CVE-2021-47483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47483" }, { "name": "CVE-2021-47484", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47484" }, { "name": "CVE-2021-47485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47485" }, { "name": "CVE-2021-47486", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47486" }, { "name": "CVE-2021-47488", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47488" }, { "name": "CVE-2021-47489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47489" }, { "name": "CVE-2021-47490", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47490" }, { "name": "CVE-2021-47491", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47491" }, { "name": "CVE-2021-47492", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47492" }, { "name": "CVE-2021-47493", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47493" }, { "name": "CVE-2021-47494", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47494" }, { "name": "CVE-2021-47495", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47495" }, { "name": "CVE-2021-47496", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47496" }, { "name": "CVE-2021-47497", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47497" }, { "name": "CVE-2021-47498", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47498" }, { "name": "CVE-2021-47499", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47499" }, { "name": "CVE-2021-47500", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47500" }, { "name": "CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "name": "CVE-2021-47502", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47502" }, { "name": "CVE-2021-47503", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47503" }, { "name": "CVE-2021-47504", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47504" }, { "name": "CVE-2021-47505", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47505" }, { "name": "CVE-2021-47506", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47506" }, { "name": "CVE-2021-47507", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47507" }, { "name": "CVE-2021-47508", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47508" }, { "name": "CVE-2021-47509", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47509" }, { "name": "CVE-2021-47510", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47510" }, { "name": "CVE-2021-47511", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47511" }, { "name": "CVE-2021-47512", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47512" }, { "name": "CVE-2021-47513", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47513" }, { "name": "CVE-2021-47514", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47514" }, { "name": "CVE-2021-47516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47516" }, { "name": "CVE-2021-47518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47518" }, { "name": "CVE-2021-47520", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47520" }, { "name": "CVE-2021-47521", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47521" }, { "name": "CVE-2021-47522", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47522" }, { "name": "CVE-2021-47523", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47523" }, { "name": "CVE-2021-47524", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47524" }, { "name": "CVE-2021-47525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47525" }, { "name": "CVE-2021-47526", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47526" }, { "name": "CVE-2021-47527", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47527" }, { "name": "CVE-2021-47528", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47528" }, { "name": "CVE-2021-47529", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47529" }, { "name": "CVE-2021-47530", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47530" }, { "name": "CVE-2021-47531", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47531" }, { "name": "CVE-2021-47532", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47532" }, { "name": "CVE-2021-47533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47533" }, { "name": "CVE-2021-47534", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47534" }, { "name": "CVE-2021-47535", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47535" }, { "name": "CVE-2021-47536", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47536" }, { "name": "CVE-2021-47537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47537" }, { "name": "CVE-2021-47538", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47538" }, { "name": "CVE-2021-47540", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47540" }, { "name": "CVE-2021-47541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47541" }, { "name": "CVE-2021-47542", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47542" }, { "name": "CVE-2021-47544", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47544" }, { "name": "CVE-2021-47548", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47548" }, { "name": "CVE-2021-47549", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47549" }, { "name": "CVE-2021-47550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47550" }, { "name": "CVE-2021-47551", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47551" }, { "name": "CVE-2021-47552", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47552" }, { "name": "CVE-2021-47553", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47553" }, { "name": "CVE-2021-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47554" }, { "name": "CVE-2021-47555", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47555" }, { "name": "CVE-2021-47556", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47556" }, { "name": "CVE-2021-47557", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47557" }, { "name": "CVE-2021-47558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47558" }, { "name": "CVE-2021-47559", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47559" }, { "name": "CVE-2021-47560", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47560" }, { "name": "CVE-2021-47562", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47562" }, { "name": "CVE-2021-47563", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47563" }, { "name": "CVE-2021-47564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47564" }, { "name": "CVE-2021-47565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47565" }, { "name": "CVE-2021-47569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47569" }, { "name": "CVE-2022-48633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48633" }, { "name": "CVE-2022-48689", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48689" }, { "name": "CVE-2022-48691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48691" }, { "name": "CVE-2022-48705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48705" }, { "name": "CVE-2022-48708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48708" }, { "name": "CVE-2022-48709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48709" }, { "name": "CVE-2022-48710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48710" }, { "name": "CVE-2023-52433", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52433" }, { "name": "CVE-2023-52527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52527" }, { "name": "CVE-2023-52586", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52586" }, { "name": "CVE-2023-52654", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52654" }, { "name": "CVE-2023-52655", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52655" }, { "name": "CVE-2023-52656", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52656" }, { "name": "CVE-2023-52657", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52657" }, { "name": "CVE-2023-52659", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52659" }, { "name": "CVE-2023-52660", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52660" }, { "name": "CVE-2023-52661", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52661" }, { "name": "CVE-2023-52662", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52662" }, { "name": "CVE-2023-52664", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52664" }, { "name": "CVE-2023-52669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52669" }, { "name": "CVE-2023-52671", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52671" }, { "name": "CVE-2023-52674", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52674" }, { "name": "CVE-2023-52676", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52676" }, { "name": "CVE-2023-52678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52678" }, { "name": "CVE-2023-52679", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52679" }, { "name": "CVE-2023-52680", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52680" }, { "name": "CVE-2023-52683", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52683" }, { "name": "CVE-2023-52685", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52685" }, { "name": "CVE-2023-52686", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52686" }, { "name": "CVE-2023-52690", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52690" }, { "name": "CVE-2023-52691", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52691" }, { "name": "CVE-2023-52692", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52692" }, { "name": "CVE-2023-52693", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52693" }, { "name": "CVE-2023-52694", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52694" }, { "name": "CVE-2023-52696", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52696" }, { "name": "CVE-2023-52698", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52698" }, { "name": "CVE-2023-52699", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52699" }, { "name": "CVE-2023-52702", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52702" }, { "name": "CVE-2023-52703", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52703" }, { "name": "CVE-2023-52705", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52705" }, { "name": "CVE-2023-52707", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52707" }, { "name": "CVE-2023-52708", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52708" }, { "name": "CVE-2023-52730", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52730" }, { "name": "CVE-2023-52731", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52731" }, { "name": "CVE-2023-52732", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52732" }, { "name": "CVE-2023-52733", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52733" }, { "name": "CVE-2023-52736", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52736" }, { "name": "CVE-2023-52738", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52738" }, { "name": "CVE-2023-52739", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52739" }, { "name": "CVE-2023-52740", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52740" }, { "name": "CVE-2023-52741", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52741" }, { "name": "CVE-2023-52742", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52742" }, { "name": "CVE-2023-52743", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52743" }, { "name": "CVE-2023-52744", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52744" }, { "name": "CVE-2023-52745", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52745" }, { "name": "CVE-2023-52746", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52746" }, { "name": "CVE-2023-52747", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52747" }, { "name": "CVE-2023-52753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52753" }, { "name": "CVE-2023-52754", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52754" }, { "name": "CVE-2023-52756", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52756" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2023-52759", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52759" }, { "name": "CVE-2023-52763", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52763" }, { "name": "CVE-2023-52764", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764" }, { "name": "CVE-2023-52766", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52766" }, { "name": "CVE-2023-52773", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52773" }, { "name": "CVE-2023-52774", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52774" }, { "name": "CVE-2023-52777", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52777" }, { "name": "CVE-2023-52781", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781" }, { "name": "CVE-2023-52788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52788" }, { "name": "CVE-2023-52789", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52789" }, { "name": "CVE-2023-52791", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791" }, { "name": "CVE-2023-52795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52795" }, { "name": "CVE-2023-52796", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796" }, { "name": "CVE-2023-52798", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52798" }, { "name": "CVE-2023-52799", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52799" }, { "name": "CVE-2023-52800", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52800" }, { "name": "CVE-2023-52803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52803" }, { "name": "CVE-2023-52804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52804" }, { "name": "CVE-2023-52805", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52805" }, { "name": "CVE-2023-52806", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52806" }, { "name": "CVE-2023-52807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52807" }, { "name": "CVE-2023-52808", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52808" }, { "name": "CVE-2023-52809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52809" }, { "name": "CVE-2023-52810", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52810" }, { "name": "CVE-2023-52811", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52811" }, { "name": "CVE-2023-52814", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52814" }, { "name": "CVE-2023-52815", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52815" }, { "name": "CVE-2023-52816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52816" }, { "name": "CVE-2023-52817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817" }, { "name": "CVE-2023-52818", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52818" }, { "name": "CVE-2023-52819", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52819" }, { "name": "CVE-2023-52821", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52821" }, { "name": "CVE-2023-52825", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52825" }, { "name": "CVE-2023-52826", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52826" }, { "name": "CVE-2023-52832", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832" }, { "name": "CVE-2023-52833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52833" }, { "name": "CVE-2023-52834", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52834" }, { "name": "CVE-2023-52838", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52838" }, { "name": "CVE-2023-52840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52840" }, { "name": "CVE-2023-52841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52841" }, { "name": "CVE-2023-52844", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52844" }, { "name": "CVE-2023-52847", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847" }, { "name": "CVE-2023-52851", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52851" }, { "name": "CVE-2023-52853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52853" }, { "name": "CVE-2023-52854", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52854" }, { "name": "CVE-2023-52855", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52855" }, { "name": "CVE-2023-52856", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52856" }, { "name": "CVE-2023-52858", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52858" }, { "name": "CVE-2023-52860", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52860" }, { "name": "CVE-2023-52861", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52861" }, { "name": "CVE-2023-52864", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864" }, { "name": "CVE-2023-52865", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52865" }, { "name": "CVE-2023-52867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52867" }, { "name": "CVE-2023-52868", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52868" }, { "name": "CVE-2023-52870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52870" }, { "name": "CVE-2023-52871", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52871" }, { "name": "CVE-2023-52872", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52872" }, { "name": "CVE-2023-52873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52873" }, { "name": "CVE-2023-52875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52875" }, { "name": "CVE-2023-52876", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52876" }, { "name": "CVE-2023-52877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877" }, { "name": "CVE-2023-52878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878" }, { "name": "CVE-2023-52880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52880" }, { "name": "CVE-2024-0090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0090" }, { "name": "CVE-2024-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0091" }, { "name": "CVE-2024-0092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0092" }, { "name": "CVE-2024-26692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26692" }, { "name": "CVE-2024-26758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26758" }, { "name": "CVE-2024-26822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26822" }, { "name": "CVE-2024-26838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26838" }, { "name": "CVE-2024-26921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921" }, { "name": "CVE-2024-26928", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26928" }, { "name": "CVE-2024-269355", "url": "https://www.cve.org/CVERecord?id=CVE-2024-269355" }, { "name": "CVE-2024-26938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26938" }, { "name": "CVE-2024-26940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26940" }, { "name": "CVE-2024-26943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26943" }, { "name": "CVE-2024-26977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26977" }, { "name": "CVE-2024-27037", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27037" }, { "name": "CVE-2024-27395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27395" }, { "name": "CVE-2024-27396", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27396" }, { "name": "CVE-2024-27400", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27400" }, { "name": "CVE-2024-27405", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27405" }, { "name": "CVE-2024-27410", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410" }, { "name": "CVE-2024-27412", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27412" }, { "name": "CVE-2024-27413", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27413" }, { "name": "CVE-2024-27416", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27416" }, { "name": "CVE-2024-27417", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27417" }, { "name": "CVE-2024-27419", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27419" }, { "name": "CVE-2024-27431", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27431" }, { "name": "CVE-2024-27435", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27435" }, { "name": "CVE-2024-27436", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27436" }, { "name": "CVE-2024-35789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789" }, { "name": "CVE-2024-35791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35791" }, { "name": "CVE-2024-35796", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35796" }, { "name": "CVE-2024-35799", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35799" }, { "name": "CVE-2024-35801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35801" }, { "name": "CVE-2024-35804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35804" }, { "name": "CVE-2024-35806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35806" }, { "name": "CVE-2024-35809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35809" }, { "name": "CVE-2024-35811", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35811" }, { "name": "CVE-2024-35812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35812" }, { "name": "CVE-2024-35813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35813" }, { "name": "CVE-2024-35815", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35815" }, { "name": "CVE-2024-35817", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35817" }, { "name": "CVE-2024-35821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35821" }, { "name": "CVE-2024-35822", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35822" }, { "name": "CVE-2024-35823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823" }, { "name": "CVE-2024-35825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35825" }, { "name": "CVE-2024-35828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35828" }, { "name": "CVE-2024-35829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35829" }, { "name": "CVE-2024-35830", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35830" }, { "name": "CVE-2024-35833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35833" }, { "name": "CVE-2024-35845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845" }, { "name": "CVE-2024-35847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847" }, { "name": "CVE-2024-35849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35849" }, { "name": "CVE-2024-35851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35851" }, { "name": "CVE-2024-35852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852" }, { "name": "CVE-2024-35854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35854" }, { "name": "CVE-2024-35860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35860" }, { "name": "CVE-2024-35861", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35861" }, { "name": "CVE-2024-35862", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35862" }, { "name": "CVE-2024-35863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35863" }, { "name": "CVE-2024-35864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35864" }, { "name": "CVE-2024-35865", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35865" }, { "name": "CVE-2024-35866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866" }, { "name": "CVE-2024-35867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867" }, { "name": "CVE-2024-35868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35868" }, { "name": "CVE-2024-35869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35869" }, { "name": "CVE-2024-35870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35870" }, { "name": "CVE-2024-35872", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35872" }, { "name": "CVE-2024-35875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35875" }, { "name": "CVE-2024-35877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35877" }, { "name": "CVE-2024-35878", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35878" }, { "name": "CVE-2024-35879", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35879" }, { "name": "CVE-2024-35885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35885" }, { "name": "CVE-2024-35887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35887" }, { "name": "CVE-2024-35895", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35895" }, { "name": "CVE-2024-35901", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35901" }, { "name": "CVE-2024-35904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35904" }, { "name": "CVE-2024-35905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35905" }, { "name": "CVE-2024-35907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35907" }, { "name": "CVE-2024-35912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35912" }, { "name": "CVE-2024-35914", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35914" }, { "name": "CVE-2024-35915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35915" }, { "name": "CVE-2024-35922", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35922" }, { "name": "CVE-2024-35924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35924" }, { "name": "CVE-2024-35930", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35930" }, { "name": "CVE-2024-35932", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35932" }, { "name": "CVE-2024-35933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35933" }, { "name": "CVE-2024-35935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35935" }, { "name": "CVE-2024-35936", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35936" }, { "name": "CVE-2024-35938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35938" }, { "name": "CVE-2024-35939", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35939" }, { "name": "CVE-2024-35940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35940" }, { "name": "CVE-2024-35943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943" }, { "name": "CVE-2024-35944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35944" }, { "name": "CVE-2024-35950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35950" }, { "name": "CVE-2024-35951", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35951" }, { "name": "CVE-2024-35952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35952" }, { "name": "CVE-2024-35955", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35955" }, { "name": "CVE-2024-35959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35959" }, { "name": "CVE-2024-35963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35963" }, { "name": "CVE-2024-35964", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35964" }, { "name": "CVE-2024-35965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35965" }, { "name": "CVE-2024-35966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35966" }, { "name": "CVE-2024-35967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35967" }, { "name": "CVE-2024-35969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35969" }, { "name": "CVE-2024-35973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35973" }, { "name": "CVE-2024-35976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35976" }, { "name": "CVE-2024-35978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35978" }, { "name": "CVE-2024-35982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35982" }, { "name": "CVE-2024-35984", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35984" }, { "name": "CVE-2024-35989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35989" }, { "name": "CVE-2024-35990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35990" }, { "name": "CVE-2024-35998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35998" }, { "name": "CVE-2024-35999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35999" }, { "name": "CVE-2024-36006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36006" }, { "name": "CVE-2024-36007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36007" }, { "name": "CVE-2024-36012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36012" }, { "name": "CVE-2024-36014", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36014" }, { "name": "CVE-2024-36015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36015" }, { "name": "CVE-2024-36016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36016" }, { "name": "CVE-2024-36026", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36026" }, { "name": "CVE-2024-36029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36029" }, { "name": "CVE-2024-36032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36032" }, { "name": "CVE-2024-36880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36880" }, { "name": "CVE-2024-36893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36893" }, { "name": "CVE-2024-36896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36896" }, { "name": "CVE-2024-36897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36897" }, { "name": "CVE-2024-36906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36906" }, { "name": "CVE-2024-36918", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36918" }, { "name": "CVE-2024-36924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36924" }, { "name": "CVE-2024-36926", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36926" }, { "name": "CVE-2024-36928", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36928" }, { "name": "CVE-2024-36931", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36931" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-36942", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36942" }, { "name": "CVE-2024-36944", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36944" }, { "name": "CVE-2024-36947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36947" }, { "name": "CVE-2024-36952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36952" }, { "name": "CVE-2024-36955", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36955" } ], "initial_release_date": "2024-06-14T00:00:00", "last_revision_date": "2024-06-14T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0496", "revisions": [ { "description": "Version initiale", "revision_date": "2024-06-14T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1979-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241979-1" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1990-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241990-1" }, { "published_at": "2024-06-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2019-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242019-1" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1983-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241983-1" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2011-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242011-1" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2010-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242010-1" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:1978-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241978-1" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2008-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242008-1" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2005-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242005-1" } ] }
CERTFR-2024-AVI-0632
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | N/A | Basesystem Module 15-SP6 | ||
SUSE | N/A | Public Cloud Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | N/A | Legacy Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | N/A | openSUSE Leap 15.6 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | N/A | Development Tools Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Public Cloud Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-26625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625" }, { "name": "CVE-2023-52622", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622" }, { "name": "CVE-2024-26814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26814" }, { "name": "CVE-2024-26750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26750" }, { "name": "CVE-2024-26813", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26813" }, { "name": "CVE-2024-26676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26676" }, { "name": "CVE-2024-26780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26780" }, { "name": "CVE-2024-26845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26845" }, { "name": "CVE-2024-26889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26889" }, { "name": "CVE-2024-26920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26920" }, { "name": "CVE-2023-38417", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38417" }, { "name": "CVE-2023-47210", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47210" }, { "name": "CVE-2024-35848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35848" }, { "name": "CVE-2024-36017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017" }, { "name": "CVE-2024-36904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36904" }, { "name": "CVE-2024-36916", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36916" }, { "name": "CVE-2024-36919", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36919" }, { "name": "CVE-2024-36934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36934" }, { "name": "CVE-2024-36957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36957" }, { "name": "CVE-2023-52656", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52656" }, { "name": "CVE-2023-52699", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52699" }, { "name": "CVE-2023-52753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52753" }, { "name": "CVE-2023-52754", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52754" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2023-52759", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52759" }, { "name": "CVE-2023-52763", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52763" }, { "name": "CVE-2023-52764", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764" }, { "name": "CVE-2023-52766", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52766" }, { "name": "CVE-2023-52773", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52773" }, { "name": "CVE-2023-52774", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52774" }, { "name": "CVE-2023-52777", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52777" }, { "name": "CVE-2023-52781", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781" }, { "name": "CVE-2023-52788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52788" }, { "name": "CVE-2023-52789", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52789" }, { "name": "CVE-2023-52791", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791" }, { "name": "CVE-2023-52795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52795" }, { "name": "CVE-2023-52796", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796" }, { "name": "CVE-2023-52798", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52798" }, { "name": "CVE-2023-52799", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52799" }, { "name": "CVE-2023-52800", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52800" }, { "name": "CVE-2023-52803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52803" }, { "name": "CVE-2023-52804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52804" }, { "name": "CVE-2023-52805", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52805" }, { "name": "CVE-2023-52806", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52806" }, { "name": "CVE-2023-52807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52807" }, { "name": "CVE-2023-52808", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52808" }, { "name": "CVE-2023-52809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52809" }, { "name": "CVE-2023-52810", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52810" }, { "name": "CVE-2023-52811", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52811" }, { "name": "CVE-2023-52814", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52814" }, { "name": "CVE-2023-52815", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52815" }, { "name": "CVE-2023-52816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52816" }, { "name": "CVE-2023-52817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817" }, { "name": "CVE-2023-52818", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52818" }, { "name": "CVE-2023-52819", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52819" }, { "name": "CVE-2023-52821", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52821" }, { "name": "CVE-2023-52825", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52825" }, { "name": "CVE-2023-52826", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52826" }, { "name": "CVE-2023-52832", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832" }, { "name": "CVE-2023-52833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52833" }, { "name": "CVE-2023-52834", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52834" }, { "name": "CVE-2023-52838", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52838" }, { "name": "CVE-2023-52840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52840" }, { "name": "CVE-2023-52841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52841" }, { "name": "CVE-2023-52844", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52844" }, { "name": "CVE-2023-52847", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847" }, { "name": "CVE-2023-52851", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52851" }, { "name": "CVE-2023-52853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52853" }, { "name": "CVE-2023-52854", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52854" }, { "name": "CVE-2023-52855", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52855" }, { "name": "CVE-2023-52856", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52856" }, { "name": "CVE-2023-52858", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52858" }, { "name": "CVE-2023-52861", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52861" }, { "name": "CVE-2023-52864", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864" }, { "name": "CVE-2023-52865", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52865" }, { "name": "CVE-2023-52867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52867" }, { "name": "CVE-2023-52868", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52868" }, { "name": "CVE-2023-52870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52870" }, { "name": "CVE-2023-52871", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52871" }, { "name": "CVE-2023-52872", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52872" }, { "name": "CVE-2023-52873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52873" }, { "name": "CVE-2023-52875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52875" }, { "name": "CVE-2023-52876", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52876" }, { "name": "CVE-2023-52877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877" }, { "name": "CVE-2023-52878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878" }, { "name": "CVE-2023-52880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52880" }, { "name": "CVE-2024-0090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0090" }, { "name": "CVE-2024-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0091" }, { "name": "CVE-2024-0092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0092" }, { "name": "CVE-2024-26758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26758" }, { "name": "CVE-2024-27419", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27419" }, { "name": "CVE-2024-35976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35976" }, { "name": "CVE-2024-35998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35998" }, { "name": "CVE-2024-36924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36924" }, { "name": "CVE-2024-36926", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36926" }, { "name": "CVE-2024-36938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938" }, { "name": "CVE-2024-36952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36952" }, { "name": "CVE-2023-52672", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52672" }, { "name": "CVE-2024-27414", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27414" }, { "name": "CVE-2024-35807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35807" }, { "name": "CVE-2024-35884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35884" }, { "name": "CVE-2024-35886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35886" }, { "name": "CVE-2024-35896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35896" }, { "name": "CVE-2024-35898", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35898" }, { "name": "CVE-2024-35900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35900" }, { "name": "CVE-2024-35925", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35925" }, { "name": "CVE-2024-35962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35962" }, { "name": "CVE-2024-36005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005" }, { "name": "CVE-2024-36008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36008" }, { "name": "CVE-2024-36960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36960" }, { "name": "CVE-2024-36964", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36964" }, { "name": "CVE-2024-36971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971" }, { "name": "CVE-2024-37353", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37353" }, { "name": "CVE-2024-38381", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38381" }, { "name": "CVE-2024-38549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38549" }, { "name": "CVE-2024-38552", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38552" }, { "name": "CVE-2024-38559", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38559" }, { "name": "CVE-2024-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38560" }, { "name": "CVE-2024-38565", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38565" }, { "name": "CVE-2024-38567", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38567" }, { "name": "CVE-2024-38578", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38578" }, { "name": "CVE-2024-38579", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38579" }, { "name": "CVE-2024-38582", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38582" }, { "name": "CVE-2024-38583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38583" }, { "name": "CVE-2024-38587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38587" }, { "name": "CVE-2024-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38599" }, { "name": "CVE-2024-38601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38601" }, { "name": "CVE-2024-38618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38618" }, { "name": "CVE-2024-38621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38621" }, { "name": "CVE-2024-38627", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38627" }, { "name": "CVE-2024-38633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38633" }, { "name": "CVE-2024-38634", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38634" }, { "name": "CVE-2024-38780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38780" }, { "name": "CVE-2024-35827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35827" }, { "name": "CVE-2024-35831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35831" }, { "name": "CVE-2024-35843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35843" }, { "name": "CVE-2023-52813", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813" }, { "name": "CVE-2023-52835", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835" }, { "name": "CVE-2023-52881", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881" }, { "name": "CVE-2021-47432", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47432" }, { "name": "CVE-2022-48772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48772" }, { "name": "CVE-2023-52735", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52735" }, { "name": "CVE-2023-52762", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52762" }, { "name": "CVE-2023-52784", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52784" }, { "name": "CVE-2023-52787", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52787" }, { "name": "CVE-2023-52837", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52837" }, { "name": "CVE-2023-52843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52843" }, { "name": "CVE-2023-52845", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52845" }, { "name": "CVE-2023-52846", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52846" }, { "name": "CVE-2023-52869", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52869" }, { "name": "CVE-2023-52884", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52884" }, { "name": "CVE-2024-33619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33619" }, { "name": "CVE-2024-35247", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35247" }, { "name": "CVE-2024-35857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35857" }, { "name": "CVE-2024-35979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35979" }, { "name": "CVE-2024-36477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36477" }, { "name": "CVE-2024-36478", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36478" }, { "name": "CVE-2024-36479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36479" }, { "name": "CVE-2024-36899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36899" }, { "name": "CVE-2024-36900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36900" }, { "name": "CVE-2024-36915", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36915" }, { "name": "CVE-2024-36917", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36917" }, { "name": "CVE-2024-36923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36923" }, { "name": "CVE-2024-36937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36937" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-36965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36965" }, { "name": "CVE-2024-36967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36967" }, { "name": "CVE-2024-36969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36969" }, { "name": "CVE-2024-36975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36975" }, { "name": "CVE-2024-36978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978" }, { "name": "CVE-2024-37021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37021" }, { "name": "CVE-2024-37078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37078" }, { "name": "CVE-2024-37354", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37354" }, { "name": "CVE-2024-38388", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38388" }, { "name": "CVE-2024-38390", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38390" }, { "name": "CVE-2024-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540" }, { "name": "CVE-2024-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541" }, { "name": "CVE-2024-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38544" }, { "name": "CVE-2024-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38545" }, { "name": "CVE-2024-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38546" }, { "name": "CVE-2024-38547", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38547" }, { "name": "CVE-2024-38548", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38548" }, { "name": "CVE-2024-38550", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38550" }, { "name": "CVE-2024-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38553" }, { "name": "CVE-2024-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38555" }, { "name": "CVE-2024-38556", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38556" }, { "name": "CVE-2024-38557", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38557" }, { "name": "CVE-2024-38564", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38564" }, { "name": "CVE-2024-38568", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38568" }, { "name": "CVE-2024-38571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38571" }, { "name": "CVE-2024-38573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38573" }, { "name": "CVE-2024-38580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38580" }, { "name": "CVE-2024-38581", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38581" }, { "name": "CVE-2024-38590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38590" }, { "name": "CVE-2024-38591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38591" }, { "name": "CVE-2024-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38594" }, { "name": "CVE-2024-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38597" }, { "name": "CVE-2024-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38600" }, { "name": "CVE-2024-38603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38603" }, { "name": "CVE-2024-38605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38605" }, { "name": "CVE-2024-38608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38608" }, { "name": "CVE-2024-38616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38616" }, { "name": "CVE-2024-38619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38619" }, { "name": "CVE-2024-38630", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38630" }, { "name": "CVE-2024-38635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38635" }, { "name": "CVE-2024-38661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38661" }, { "name": "CVE-2024-39301", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39301" }, { "name": "CVE-2024-39469", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39469" }, { "name": "CVE-2024-39471", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39471" }, { "name": "CVE-2024-38610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38610" }, { "name": "CVE-2024-35880", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35880" }, { "name": "CVE-2024-35892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35892" }, { "name": "CVE-2024-35926", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35926" }, { "name": "CVE-2024-35957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35957" }, { "name": "CVE-2024-35970", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35970" }, { "name": "CVE-2024-36024", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36024" }, { "name": "CVE-2024-38543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38543" }, { "name": "CVE-2024-38663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38663" }, { "name": "CVE-2024-36973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36973" }, { "name": "CVE-2024-38615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38615" }, { "name": "CVE-2024-39371", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39371" }, { "name": "CVE-2023-52749", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52749" }, { "name": "CVE-2023-52750", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52750" }, { "name": "CVE-2023-52765", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52765" }, { "name": "CVE-2023-52767", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52767" }, { "name": "CVE-2023-52768", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52768" }, { "name": "CVE-2023-52769", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52769" }, { "name": "CVE-2023-52776", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52776" }, { "name": "CVE-2023-52780", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52780" }, { "name": "CVE-2023-52782", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52782" }, { "name": "CVE-2023-52783", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52783" }, { "name": "CVE-2023-52786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52786" }, { "name": "CVE-2023-52792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52792" }, { "name": "CVE-2023-52794", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52794" }, { "name": "CVE-2023-52801", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52801" }, { "name": "CVE-2023-52812", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52812" }, { "name": "CVE-2023-52827", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52827" }, { "name": "CVE-2023-52829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52829" }, { "name": "CVE-2023-52836", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52836" }, { "name": "CVE-2023-52842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52842" }, { "name": "CVE-2023-52849", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52849" }, { "name": "CVE-2023-52850", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52850" }, { "name": "CVE-2023-52857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52857" }, { "name": "CVE-2023-52862", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52862" }, { "name": "CVE-2023-52863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52863" }, { "name": "CVE-2023-52866", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52866" }, { "name": "CVE-2023-52874", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52874" }, { "name": "CVE-2023-52879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52879" }, { "name": "CVE-2023-52883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52883" }, { "name": "CVE-2024-26482", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26482" }, { "name": "CVE-2024-26767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26767" }, { "name": "CVE-2024-34777", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34777" }, { "name": "CVE-2024-36010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36010" }, { "name": "CVE-2024-36281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36281" }, { "name": "CVE-2024-36882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36882" }, { "name": "CVE-2024-36887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36887" }, { "name": "CVE-2024-36903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36903" }, { "name": "CVE-2024-36935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36935" }, { "name": "CVE-2024-36962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36962" }, { "name": "CVE-2024-36972", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36972" }, { "name": "CVE-2024-36977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36977" }, { "name": "CVE-2024-38384", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38384" }, { "name": "CVE-2024-38385", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38385" }, { "name": "CVE-2024-38391", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38391" }, { "name": "CVE-2024-38539", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38539" }, { "name": "CVE-2024-38551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38551" }, { "name": "CVE-2024-38554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38554" }, { "name": "CVE-2024-38562", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38562" }, { "name": "CVE-2024-38566", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38566" }, { "name": "CVE-2024-38569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38569" }, { "name": "CVE-2024-38570", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38570" }, { "name": "CVE-2024-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38572" }, { "name": "CVE-2024-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575" }, { "name": "CVE-2024-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38588" }, { "name": "CVE-2024-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38592" }, { "name": "CVE-2024-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38595" }, { "name": "CVE-2024-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38602" }, { "name": "CVE-2024-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611" }, { "name": "CVE-2024-38617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38617" }, { "name": "CVE-2024-38622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38622" }, { "name": "CVE-2024-38628", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38628" }, { "name": "CVE-2024-38629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38629" }, { "name": "CVE-2024-38636", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38636" }, { "name": "CVE-2024-38664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38664" }, { "name": "CVE-2024-39277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39277" }, { "name": "CVE-2024-39291", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39291" }, { "name": "CVE-2024-39296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39296" }, { "name": "CVE-2024-39362", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39362" }, { "name": "CVE-2024-39463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39463" }, { "name": "CVE-2024-39466", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39466" } ], "initial_release_date": "2024-07-26T00:00:00", "last_revision_date": "2024-07-26T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0632", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-26T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2024-07-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2575-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242575-1" }, { "published_at": "2024-07-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2585-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242585-1" }, { "published_at": "2024-07-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2571-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242571-1" } ] }
opensuse-su-2024:14026-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14026", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14026-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0090 page", "url": "https://www.suse.com/security/cve/CVE-2024-0090/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0091 page", "url": "https://www.suse.com/security/cve/CVE-2024-0091/" } ], "title": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14026-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0090" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0090", "url": "https://www.suse.com/security/cve/CVE-2024-0090" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0090", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0091" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0091", "url": "https://www.suse.com/security/cve/CVE-2024-0091" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0091", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1.x86_64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.aarch64", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.ppc64le", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.s390x", "openSUSE Tumbleweed:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k6.9.3_1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-0091" } ] }
opensuse-su-2024:14024-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14024", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14024-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0090 page", "url": "https://www.suse.com/security/cve/CVE-2024-0090/" } ], "title": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14024-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0090" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0090", "url": "https://www.suse.com/security/cve/CVE-2024-0090" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0090", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.aarch64", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.ppc64le", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.s390x", "openSUSE Tumbleweed:kernel-firmware-nvidia-gspx-G06-550.90.07-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-0090" } ] }
suse-su-2024:2585-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-firmware-nvidia-gspx-G06", "title": "Title of the patch" }, { "category": "description", "text": "This update for kernel-firmware-nvidia-gspx-G06 fixes the following issues:\n\nUpdate to version 555.42.06 for CUDA.\n\nSecurity Update 550.90.07:\n\n- CVE-2024-0090: Fixed out of bounds write (bsc#1223356).\n- CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).\n- CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).\n\nChanges in kernel-firmware-nvidia-gspx-G06:\n\n- Update to 550.100 (bsc#1227575)\n\n- Add a second flavor to be used by the kernel module versions\n used by CUDA. The firmware targetting CUDA contains \u0027-cuda\u0027 in\n its name to track its versions separately from the graphics\n firmware. (bsc#1227417)\n\nChanges in nvidia-open-driver-G06-signed:\n\n- Update to 550.100 (bsc#1227575)\n\n * Fixed a bug that caused OpenGL triple buffering to behave like\n double buffering.\n\n- To avoid issues with missing dependencies when no CUDA repo\n is present make the dependecy to nvidia-compute-G06 conditional.\n\n- CUDA is not available for Tumbleweed, exclude the build of the\n cuda flavor.\n\n- preamble: let the -cuda flavor KMP require the -cuda flavor\n firmware\n\n- Add a second flavor for building the kernel module versions\n used by CUDA. The kmp targetting CUDA contains \u0027-cuda\u0027 in\n its name to track its versions separately from the graphics\n kmp. (bsc#1227417)\n- Provide the meta package nv-prefer-signed-open-driver to\n make sure the latest available SUSE-build open driver is\n installed - independent of the latest available open driver\n version in he CUDA repository.\n Rationale:\n The package cuda-runtime provides the link between CUDA and\n the kernel driver version through a\n Requires: cuda-drivers \u003e= %version\n This implies that a CUDA version will run withany kernel driver\n version equal or higher than a base version.\n nvidia-compute-G06 provides the glue layer between CUDA and\n a specific version of he kernel driver both by providing\n a set of base libraries and by requiring a specific kernel\n version. \u0027cuda-drivers\u0027 (provided by nvidia-compute-utils-G06)\n requires an unversioned nvidia-compute-G06. With this, the\n resolver will install the latest available and applicable\n nvidia-compute-G06.\n nv-prefer-signed-open-driver then represents the latest available\n open driver version and restricts the nvidia-compute-G06 version\n to it. (bsc#1227419)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2585,SUSE-SLE-Module-Basesystem-15-SP6-2024-2585,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2585,openSUSE-SLE-15.6-2024-2585", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2585-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2585-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-July/036081.html" }, { "category": "self", "summary": "SUSE Bug 1223356", "url": "https://bugzilla.suse.com/1223356" }, { "category": "self", "summary": "SUSE Bug 1223454", "url": "https://bugzilla.suse.com/1223454" }, { "category": "self", "summary": "SUSE Bug 1227417", "url": "https://bugzilla.suse.com/1227417" }, { "category": "self", "summary": "SUSE Bug 1227419", "url": "https://bugzilla.suse.com/1227419" }, { "category": "self", "summary": "SUSE Bug 1227575", "url": "https://bugzilla.suse.com/1227575" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0090 page", "url": "https://www.suse.com/security/cve/CVE-2024-0090/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0091 page", "url": "https://www.suse.com/security/cve/CVE-2024-0091/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0092 page", "url": "https://www.suse.com/security/cve/CVE-2024-0092/" } ], "title": "Security update for kernel-firmware-nvidia-gspx-G06", "tracking": { "current_release_date": "2024-07-22T11:44:18Z", "generator": { "date": "2024-07-22T11:44:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2585-1", "initial_release_date": "2024-07-22T11:44:18Z", "revision_history": [ { "date": "2024-07-22T11:44:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "product_id": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "product": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "product_id": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "product_id": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "product": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "product_id": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0090" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0090", "url": "https://www.suse.com/security/cve/CVE-2024-0090" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0090", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-22T11:44:18Z", "details": "important" } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0091" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0091", "url": "https://www.suse.com/security/cve/CVE-2024-0091" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0091", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-22T11:44:18Z", "details": "important" } ], "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0092" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0092", "url": "https://www.suse.com/security/cve/CVE-2024-0092" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0092", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:kernel-firmware-nvidia-gspx-G06-cuda-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nv-prefer-signed-open-driver-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-64kb-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-azure-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-64kb-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-azure-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-default-devel-555.42.06-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-64kb-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-azure-555.42.06_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-cuda-kmp-default-555.42.06_k6.4.0_150600.23.7-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-default-devel-550.100-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-64kb-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-azure-550.100_k6.4.0_150600.8.5-150600.3.7.1.x86_64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.aarch64", "openSUSE Leap 15.6:nvidia-open-driver-G06-signed-kmp-default-550.100_k6.4.0_150600.23.7-150600.3.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-22T11:44:18Z", "details": "important" } ], "title": "CVE-2024-0092" } ] }
suse-su-2024:1990-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed", "title": "Title of the patch" }, { "category": "description", "text": "This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:\n\nSecurity Update 550.90.07:\n\n- CVE-2024-0090: Fixed out of bounds write (bsc#1223356).\n- CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).\n- CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1990,SUSE-SLE-Micro-5.5-2024-1990,SUSE-SLE-Module-Basesystem-15-SP5-2024-1990,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1990,openSUSE-SLE-15.5-2024-1990", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1990-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1990-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241990-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1990-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035545.html" }, { "category": "self", "summary": "SUSE Bug 1223356", "url": "https://bugzilla.suse.com/1223356" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0090 page", "url": "https://www.suse.com/security/cve/CVE-2024-0090/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0091 page", "url": "https://www.suse.com/security/cve/CVE-2024-0091/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0092 page", "url": "https://www.suse.com/security/cve/CVE-2024-0092/" } ], "title": "Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed", "tracking": { "current_release_date": "2024-06-11T11:50:04Z", "generator": { "date": "2024-06-11T11:50:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1990-1", "initial_release_date": "2024-06-11T11:50:04Z", "revision_history": [ { "date": "2024-06-11T11:50:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0090" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0090", "url": "https://www.suse.com/security/cve/CVE-2024-0090" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0090", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-11T11:50:04Z", "details": "important" } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0091" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0091", "url": "https://www.suse.com/security/cve/CVE-2024-0091" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0091", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-11T11:50:04Z", "details": "important" } ], "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0092" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0092", "url": "https://www.suse.com/security/cve/CVE-2024-0092" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0092", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Micro 5.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.aarch64", "openSUSE Leap 15.5:kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1.x86_64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.aarch64", "openSUSE Leap 15.5:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-11T11:50:04Z", "details": "important" } ], "title": "CVE-2024-0092" } ] }
suse-su-2024:2005-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed", "title": "Title of the patch" }, { "category": "description", "text": "This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:\n\nSecurity Update 550.90.07:\n\n- CVE-2024-0090: Fixed out of bounds write (bsc#1223356).\n- CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).\n- CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2005,SUSE-SLE-Micro-5.3-2024-2005,SUSE-SLE-Micro-5.4-2024-2005,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2005,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2005,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2005,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2005,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2005,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2005,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2005", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2005-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2005-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242005-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2005-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035573.html" }, { "category": "self", "summary": "SUSE Bug 1223356", "url": "https://bugzilla.suse.com/1223356" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0090 page", "url": "https://www.suse.com/security/cve/CVE-2024-0090/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0091 page", "url": "https://www.suse.com/security/cve/CVE-2024-0091/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0092 page", "url": "https://www.suse.com/security/cve/CVE-2024-0092/" } ], "title": "Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed", "tracking": { "current_release_date": "2024-06-12T08:55:43Z", "generator": { "date": "2024-06-12T08:55:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2005-1", "initial_release_date": "2024-06-12T08:55:43Z", "revision_history": [ { "date": "2024-06-12T08:55:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "product": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "product_id": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150400.9.62.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150400.9.62.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-azure-devel-550.90.07-150400.9.62.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150400.14.75-150400.9.62.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150400.14.75-150400.9.62.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150400.14.75-150400.9.62.1.x86_64" } }, { "category": "product_version", "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "product": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "product_id": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64" }, "product_reference": "kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" }, "product_reference": "nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0090" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0090", "url": "https://www.suse.com/security/cve/CVE-2024-0090" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0090", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-12T08:55:43Z", "details": "important" } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0091" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0091", "url": "https://www.suse.com/security/cve/CVE-2024-0091" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0091", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-12T08:55:43Z", "details": "important" } ], "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0092" } ], "notes": [ { "category": "general", "text": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0092", "url": "https://www.suse.com/security/cve/CVE-2024-0092" }, { "category": "external", "summary": "SUSE Bug 1223356 for CVE-2024-0092", "url": "https://bugzilla.suse.com/1223356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Micro 5.4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Proxy 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1.x86_64", "SUSE Manager Server 4.3:nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-12T08:55:43Z", "details": "important" } ], "title": "CVE-2024-0092" } ] }
gsd-2024-0090
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2024-0090", "id": "GSD-2024-0090" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-0090" ], "id": "GSD-2024-0090", "modified": "2023-12-13T01:21:42.587114Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-0090", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
wid-sec-w-2024-1309
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "NVidia ist ein Hersteller von Grafikkarten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Nvidia Grafiktreibern ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1309 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1309.json" }, { "category": "self", "summary": "WID-SEC-2024-1309 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1309" }, { "category": "external", "summary": "NVIDIA GPU Display Driver Security Bulletin June 2024 vom 2024-06-06", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-203 vom 2024-06-08", "url": "https://www.dell.com/support/kbdoc/de-de/000224676/dsa-2024-203" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1990-1 vom 2024-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018693.html" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-163020 vom 2024-06-11", "url": "https://support.lenovo.com/us/en/product_security/LEN-163020" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2005-1 vom 2024-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018708.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03952 vom 2024-06-07", "url": "https://support.hp.com/us-en/document/ish_10842607-10842633-16/HPSBHF03952" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2585-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019009.html" } ], "source_lang": "en-US", "title": "Nvidia Treiber: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-22T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:09:54.137+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1309", "initial_release_date": "2024-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE und LENOVO aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T032783", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T031292", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T030470", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Nvidia Treiber", "product": { "name": "Nvidia Treiber", "product_id": "T035254", "product_identification_helper": { "cpe": "cpe:/a:nvidia:display_driver:-" } } } ], "category": "vendor", "name": "Nvidia" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0084", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0084" }, { "cve": "CVE-2024-0085", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0085" }, { "cve": "CVE-2024-0086", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0086" }, { "cve": "CVE-2024-0089", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0089" }, { "cve": "CVE-2024-0090", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0092" }, { "cve": "CVE-2024-0093", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0093" }, { "cve": "CVE-2024-0094", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0094" }, { "cve": "CVE-2024-0099", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0099" } ] }
WID-SEC-W-2024-1309
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "NVidia ist ein Hersteller von Grafikkarten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Nvidia Grafiktreibern ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1309 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1309.json" }, { "category": "self", "summary": "WID-SEC-2024-1309 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1309" }, { "category": "external", "summary": "NVIDIA GPU Display Driver Security Bulletin June 2024 vom 2024-06-06", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-203 vom 2024-06-08", "url": "https://www.dell.com/support/kbdoc/de-de/000224676/dsa-2024-203" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1990-1 vom 2024-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018693.html" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-163020 vom 2024-06-11", "url": "https://support.lenovo.com/us/en/product_security/LEN-163020" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2005-1 vom 2024-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018708.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03952 vom 2024-06-07", "url": "https://support.hp.com/us-en/document/ish_10842607-10842633-16/HPSBHF03952" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2585-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019009.html" } ], "source_lang": "en-US", "title": "Nvidia Treiber: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-22T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:09:54.137+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1309", "initial_release_date": "2024-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE und LENOVO aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T032783", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T031292", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T030470", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Nvidia Treiber", "product": { "name": "Nvidia Treiber", "product_id": "T035254", "product_identification_helper": { "cpe": "cpe:/a:nvidia:display_driver:-" } } } ], "category": "vendor", "name": "Nvidia" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0084", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0084" }, { "cve": "CVE-2024-0085", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0085" }, { "cve": "CVE-2024-0086", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0086" }, { "cve": "CVE-2024-0089", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0089" }, { "cve": "CVE-2024-0090", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0092" }, { "cve": "CVE-2024-0093", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0093" }, { "cve": "CVE-2024-0094", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0094" }, { "cve": "CVE-2024-0099", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Nvidia Grafiktreibern. Diese befinden sich in den GPU- und vGPU-Treibern unter anderem aufgrund einer NULL-Pointer-Dereferenzierung, eines Out-of-Bounds-Writings und einer fehlerhaften Initialisierung. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder beliebige Dateien auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T031292", "T035254", "T030470", "T032783" ] }, "release_date": "2024-06-06T22:00:00.000+00:00", "title": "CVE-2024-0099" } ] }
fkie_cve-2024-0090
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F", "versionEndExcluding": "475.06", "versionStartIncluding": "470", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC", "versionEndExcluding": "538.67", "versionStartIncluding": "535", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63", "versionEndExcluding": "552.55", "versionStartIncluding": "550", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F", "versionEndExcluding": "555.99", "versionStartIncluding": "555", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*", "matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*", "matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "D66C0B72-0A3F-4D61-8BF5-B0BED03014E0", "versionEndExcluding": "470.256.02", "versionStartIncluding": "470", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "3EC43E03-3909-4AB5-A9FD-198E55167AD2", "versionEndExcluding": "535.180.01", "versionStartIncluding": "535", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4", "versionEndExcluding": "550.90.07", "versionStartIncluding": "550", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49", "versionEndExcluding": "555.52.04", "versionStartIncluding": "555", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*", "matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7", "vulnerable": false }, { "criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*", "matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*", "matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199", "versionEndExcluding": "13.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1", "versionEndExcluding": "16.6", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439", "versionEndExcluding": "17.2", "versionStartIncluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C", "vulnerable": false }, { "criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428", "vulnerable": false }, { "criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002", "versionEndExcluding": "555.99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*", "matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36", "versionEndExcluding": "555.52.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428", "vulnerable": false }, { "criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*", "matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E", "versionEndExcluding": "17.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." }, { "lang": "es", "value": "El controlador de GPU NVIDIA para Windows y Linux contiene una vulnerabilidad en la que un usuario puede provocar una escritura fuera de los l\u00edmites. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, denegaci\u00f3n de servicio, escalada de privilegios, divulgaci\u00f3n de informaci\u00f3n y manipulaci\u00f3n de datos." } ], "id": "CVE-2024-0090", "lastModified": "2024-11-21T08:45:52.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@nvidia.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-13T22:15:12.170", "references": [ { "source": "psirt@nvidia.com", "tags": [ "Vendor Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" } ], "sourceIdentifier": "psirt@nvidia.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "psirt@nvidia.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
NCSC-2024-0260
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Nvidia heeft kwetsbaarheden verholpen in GPU drivers voor Windows en Linux.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om zich verhoogde rechten toe te kennen en code uit te voeren met verhoogde rechten, of toegang te krijgen tot gevoelige gegevens.", "title": "Interpretaties" }, { "category": "description", "text": "Nvidia heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Execution with Unnecessary Privileges", "title": "CWE-250" }, { "category": "general", "text": "Incorrect Privilege Assignment", "title": "CWE-266" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Initialization", "title": "CWE-665" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Control of Interaction Frequency", "title": "CWE-799" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" } ], "title": "Kwetsbaarheden verholpen in Nvidia GPU Drivers", "tracking": { "current_release_date": "2024-06-14T06:34:54.620125Z", "id": "NCSC-2024-0260", "initial_release_date": "2024-06-14T06:34:54.620125Z", "revision_history": [ { "date": "2024-06-14T06:34:54.620125Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cloud_gaming_april_2024_release", "product": { "name": "cloud_gaming_april_2024_release", "product_id": "CSAFPID-1479151", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming_april_2024_release:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480290", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480268", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480267", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480278", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480283", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480300", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480292", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480259", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480273", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480284", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480297", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480295", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480266", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480274", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480289", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480281", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480294", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480260", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480271", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473848", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:470.239.01:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473849", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:535.161.05:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473852", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:550.54.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver__vgpu_software__and_cloud_gaming", "product": { "name": "gpu_display_driver__vgpu_software__and_cloud_gaming", "product_id": "CSAFPID-1480196", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver__vgpu_software__and_cloud_gaming:all_versions_up_to_and_including_17.1__16.5__13.10__and_the_april_2024_release:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-759848", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896986", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480265", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896987", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896988", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896989", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896990", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896991", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896992", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896993", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896994", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896995", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896996", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896997", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896998", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480296", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480286", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480275", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480263", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software_and_cloud_gaming", "product": { "name": "vgpu_software_and_cloud_gaming", "product_id": "CSAFPID-1480195", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software_and_cloud_gaming:all_versions_up_to_and_including_17.1__16.5__13.10__and_the_april_2024_release:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480288", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480279", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480277", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480287", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480299", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480264", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480270", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480280", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480293", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480301", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480262", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480269", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480276", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480285", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480298", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480261", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480272", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480282", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480291", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473847", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473850", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473851", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239947", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239949", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239944", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31772", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31775", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239943", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-275947", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-586407", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:12.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31778", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239939", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31776", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-241344", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "nvidia" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0084", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "notes": [ { "category": "other", "text": "Execution with Unnecessary Privileges", "title": "CWE-250" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0084", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0084.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0084" }, { "cve": "CVE-2024-0085", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "notes": [ { "category": "other", "text": "Incorrect Privilege Assignment", "title": "CWE-266" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0085" }, { "cve": "CVE-2024-0086", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0086.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0086" }, { "cve": "CVE-2024-0089", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "other", "text": "Improper Initialization", "title": "CWE-665" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0089", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0089.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0089" }, { "cve": "CVE-2024-0090", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0090", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0090.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0092", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0092.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0092" }, { "cve": "CVE-2024-0093", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-241344", "CSAFPID-31776", "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0093", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0093.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-241344", "CSAFPID-31776", "CSAFPID-1480195" ] } ], "title": "CVE-2024-0093" }, { "cve": "CVE-2024-0094", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "other", "text": "Improper Control of Interaction Frequency", "title": "CWE-799" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0094", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0094.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0094" }, { "cve": "CVE-2024-0099", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0099.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0099" } ] }
ncsc-2024-0260
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Nvidia heeft kwetsbaarheden verholpen in GPU drivers voor Windows en Linux.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om zich verhoogde rechten toe te kennen en code uit te voeren met verhoogde rechten, of toegang te krijgen tot gevoelige gegevens.", "title": "Interpretaties" }, { "category": "description", "text": "Nvidia heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Execution with Unnecessary Privileges", "title": "CWE-250" }, { "category": "general", "text": "Incorrect Privilege Assignment", "title": "CWE-266" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Initialization", "title": "CWE-665" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Control of Interaction Frequency", "title": "CWE-799" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551" } ], "title": "Kwetsbaarheden verholpen in Nvidia GPU Drivers", "tracking": { "current_release_date": "2024-06-14T06:34:54.620125Z", "id": "NCSC-2024-0260", "initial_release_date": "2024-06-14T06:34:54.620125Z", "revision_history": [ { "date": "2024-06-14T06:34:54.620125Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cloud_gaming_april_2024_release", "product": { "name": "cloud_gaming_april_2024_release", "product_id": "CSAFPID-1479151", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming_april_2024_release:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480290", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480268", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480267", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480278", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480283", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480300", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480292", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480259", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480273", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480284", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480297", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480295", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480266", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480274", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480289", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480281", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480294", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480260", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cloud_gaming", "product": { "name": "cloud_gaming", "product_id": "CSAFPID-1480271", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:cloud_gaming:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473848", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:470.239.01:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473849", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:535.161.05:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "driver", "product": { "name": "driver", "product_id": "CSAFPID-1473852", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:driver:550.54.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver__vgpu_software__and_cloud_gaming", "product": { "name": "gpu_display_driver__vgpu_software__and_cloud_gaming", "product_id": "CSAFPID-1480196", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver__vgpu_software__and_cloud_gaming:all_versions_up_to_and_including_17.1__16.5__13.10__and_the_april_2024_release:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-759848", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896986", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480265", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896987", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896988", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896989", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896990", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896991", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896992", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896993", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896994", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896995", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896996", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896997", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-896998", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480296", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480286", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480275", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "gpu_display_driver", "product": { "name": "gpu_display_driver", "product_id": "CSAFPID-1480263", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:gpu_display_driver:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software_and_cloud_gaming", "product": { "name": "vgpu_software_and_cloud_gaming", "product_id": "CSAFPID-1480195", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software_and_cloud_gaming:all_versions_up_to_and_including_17.1__16.5__13.10__and_the_april_2024_release:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480288", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480279", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480277", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480287", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480299", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480264", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480270", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480280", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480293", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480301", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480262", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:13.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480269", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480276", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480285", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480298", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480261", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480272", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480282", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu_software", "product": { "name": "vgpu_software", "product_id": "CSAFPID-1480291", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu_software:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473847", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:13.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473850", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:16.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "vgpu", "product": { "name": "vgpu", "product_id": "CSAFPID-1473851", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:vgpu:17.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239947", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239949", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239944", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:10.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31772", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31775", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239943", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:11.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-275947", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-586407", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:12.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31778", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:13.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-239939", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:13.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-31776", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "virtual_gpu", "product": { "name": "virtual_gpu", "product_id": "CSAFPID-241344", "product_identification_helper": { "cpe": "cpe:2.3:a:nvidia:virtual_gpu:14.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "nvidia" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0084", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "notes": [ { "category": "other", "text": "Execution with Unnecessary Privileges", "title": "CWE-250" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0084", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0084.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0084" }, { "cve": "CVE-2024-0085", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "notes": [ { "category": "other", "text": "Incorrect Privilege Assignment", "title": "CWE-266" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0085" }, { "cve": "CVE-2024-0086", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0086.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0086" }, { "cve": "CVE-2024-0089", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "other", "text": "Improper Initialization", "title": "CWE-665" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0089", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0089.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0089" }, { "cve": "CVE-2024-0090", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0090", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0090.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0090" }, { "cve": "CVE-2024-0091", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0091" }, { "cve": "CVE-2024-0092", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-1480196" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0092", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0092.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480196" ] } ], "title": "CVE-2024-0092" }, { "cve": "CVE-2024-0093", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-241344", "CSAFPID-31776", "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0093", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0093.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-241344", "CSAFPID-31776", "CSAFPID-1480195" ] } ], "title": "CVE-2024-0093" }, { "cve": "CVE-2024-0094", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "other", "text": "Improper Control of Interaction Frequency", "title": "CWE-799" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0094", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0094.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0094" }, { "cve": "CVE-2024-0099", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "product_status": { "known_affected": [ "CSAFPID-1480195" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0099.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1480195" ] } ], "title": "CVE-2024-0099" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.