![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2022.0198 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2022-0198) |
Zusammenfassung: | The remote host is missing an update for the 'ldetect-lst, nvidia-current' package(s) announced via the MGASA-2022-0198 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'ldetect-lst, nvidia-current' package(s) announced via the MGASA-2022-0198 advisory. Vulnerability Insight: Updated nvidia-current packages fix security vulnerabilities: NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components (CVE-2022-28181). NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause an out-of-bounds read, which may lead to denial of service and information disclosure (CVE-2022-28183). NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can access administrator- privileged registers, which may lead to denial of service, information disclosure, and data tampering (CVE-2022-28184). NVIDIA GPU Display Driver contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering (CVE-2022-28185). NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where uncontrolled resource consumption can be triggered by an unprivileged regular user, which may lead to denial of service (CVE-2022-28191). NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges (CVE-2022-28192). This update also contains the following: * Adds support for the following GPUs: GeForce RTX 3050 GeForce RTX 3070 Ti Laptop GPU GeForce RTX 3080 Ti Laptop GPU GeForce RTX 3090 Ti RTX A500 Laptop GPU RTX A1000 Laptop GPU RTX A2000 8GB Laptop GPU RTX A3000 12GB Laptop GPU RTX A4500 Laptop GPU RTX A5500 Laptop GPU T550 Laptop GPU * Fixes an issue where NvFBC was requesting Vulkan 1.0 while using Vulkan 1.1 core features. This caused NvFBC to fail to initialize with Vulkan loader versions 1.3.204 or newer. * Added an application profile to avoid an image corruption issue in Blender, as described at [link moved to references] Affected Software/OS: 'ldetect-lst, nvidia-current' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |