
Cloud Vulnerability DB
A community-led vulnerabilities database
NVIDIA GPU Display Driver for Linux contains a vulnerability (CVE-2023-0189) in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The vulnerability was discovered and disclosed in January 2023, affecting multiple versions of NVIDIA GPU drivers across different operating systems (NVD, NVIDIA).
The vulnerability exists in the kernel mode layer handler of the NVIDIA GPU Display Driver for Linux. It has been assigned a CVSS v3.1 base score of 8.8 (High) with the vector AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. The vulnerability is classified under CWE-822, indicating issues related to untrusted pointer dereference (NVIDIA).
The exploitation of this vulnerability can lead to multiple severe consequences including unauthorized code execution, denial of service conditions, privilege escalation, information disclosure, and data tampering in affected systems. This comprehensive impact on system security makes it a significant threat to affected installations (NVD, NVIDIA).
NVIDIA has released security updates to address this vulnerability across multiple driver branches. For Linux systems, the fixed versions are: R530 version 530.41.03, R525 version 525.105.17, R515 version 515.105.01, R470 version 470.182.03, and R450 version 450.236.01. Users are strongly advised to update to these patched versions (NVIDIA, Gentoo).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."