Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-34665 (GCVE-0-2022-34665)
Vulnerability from cvelistv5 – Published: 2022-11-18 00:00 – Updated: 2025-04-29 19:16- CWE-476 - NULL Pointer Dereference
| URL | Tags |
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_… | |
| https://security.gentoo.org/glsa/202310-02 | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| NVIDIA | NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager) |
Affected:
All versions prior to the August 2022 release
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T09:15:15.715Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"name": "GLSA-202310-02",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202310-02"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-34665",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-29T19:16:36.385458Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-29T19:16:43.538Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)",
"vendor": "NVIDIA",
"versions": [
{
"status": "affected",
"version": "All versions prior to the August 2022 release"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476 NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-03T14:06:32.855Z",
"orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"shortName": "nvidia"
},
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"name": "GLSA-202310-02",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202310-02"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"assignerShortName": "nvidia",
"cveId": "CVE-2022-34665",
"datePublished": "2022-11-18T00:00:00.000Z",
"dateReserved": "2022-06-27T00:00:00.000Z",
"dateUpdated": "2025-04-29T19:16:43.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-34665",
"date": "2026-05-11",
"epss": "0.00131",
"percentile": "0.31974"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"471.11\", \"versionEndExcluding\": \"473.81\", \"matchCriteriaId\": \"9E31C0C2-5C06-4E5E-9106-1ABE98D37C13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"516.25\", \"versionEndExcluding\": \"516.94\", \"matchCriteriaId\": \"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B30520A-D378-4CC8-812D-3B443740D6E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndExcluding\": \"11.8\", \"matchCriteriaId\": \"45F338C5-245D-4D10-9B48-B56B7094F167\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0\", \"versionEndExcluding\": \"13.3\", \"matchCriteriaId\": \"98C8F13F-2F8F-4BAE-B971-582084B93D58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CB2F728-3BFD-418D-AC29-A4165D1E7CA6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:cloud_gaming_guest:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"516.94\", \"matchCriteriaId\": \"D619D0D6-04FF-4C1E-84BC-BF44C3328451\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"516.25\", \"versionEndExcluding\": \"516.94\", \"matchCriteriaId\": \"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1ED5DE2-7677-4F38-8177-3BF0B3D03A09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"471.11\", \"versionEndExcluding\": \"473.81\", \"matchCriteriaId\": \"9E31C0C2-5C06-4E5E-9106-1ABE98D37C13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"511.09\", \"versionEndExcluding\": \"513.46\", \"matchCriteriaId\": \"094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"516.25\", \"versionEndExcluding\": \"516.94\", \"matchCriteriaId\": \"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1ED5DE2-7677-4F38-8177-3BF0B3D03A09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"451.48\", \"versionEndExcluding\": \"453.64\", \"matchCriteriaId\": \"CE6F7210-C895-478D-8155-85335EFEAE4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"471.11\", \"versionEndExcluding\": \"472.81\", \"matchCriteriaId\": \"D66D8563-40B2-4B35-BC8B-C2905C9D4FC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"511.09\", \"versionEndExcluding\": \"513.46\", \"matchCriteriaId\": \"094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"516.25\", \"versionEndExcluding\": \"516.94\", \"matchCriteriaId\": \"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75C6DE26-88F2-428E-B761-754BD027E015\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.\"}, {\"lang\": \"es\", \"value\": \"NVIDIA GPU Display Driver para Windows y Linux contiene una vulnerabilidad en la capa del modo kernel, donde un usuario local con capacidades b\\u00e1sicas puede provocar una desreferencia del puntero nulo, lo que puede provocar una Denegaci\\u00f3n de Servicio (DoS).\"}]",
"id": "CVE-2022-34665",
"lastModified": "2024-11-21T07:09:56.200",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@nvidia.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 4.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 4.0}]}",
"published": "2022-11-19T00:15:27.557",
"references": "[{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\", \"source\": \"psirt@nvidia.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202310-02\", \"source\": \"psirt@nvidia.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202310-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "psirt@nvidia.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt@nvidia.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-34665\",\"sourceIdentifier\":\"psirt@nvidia.com\",\"published\":\"2022-11-19T00:15:27.557\",\"lastModified\":\"2024-11-21T07:09:56.200\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.\"},{\"lang\":\"es\",\"value\":\"NVIDIA GPU Display Driver para Windows y Linux contiene una vulnerabilidad en la capa del modo kernel, donde un usuario local con capacidades b\u00e1sicas puede provocar una desreferencia del puntero nulo, lo que puede provocar una Denegaci\u00f3n de Servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"471.11\",\"versionEndExcluding\":\"473.81\",\"matchCriteriaId\":\"9E31C0C2-5C06-4E5E-9106-1ABE98D37C13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"516.25\",\"versionEndExcluding\":\"516.94\",\"matchCriteriaId\":\"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B30520A-D378-4CC8-812D-3B443740D6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.8\",\"matchCriteriaId\":\"45F338C5-245D-4D10-9B48-B56B7094F167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.3\",\"matchCriteriaId\":\"98C8F13F-2F8F-4BAE-B971-582084B93D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB2F728-3BFD-418D-AC29-A4165D1E7CA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:cloud_gaming_guest:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"516.94\",\"matchCriteriaId\":\"D619D0D6-04FF-4C1E-84BC-BF44C3328451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"516.25\",\"versionEndExcluding\":\"516.94\",\"matchCriteriaId\":\"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1ED5DE2-7677-4F38-8177-3BF0B3D03A09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"471.11\",\"versionEndExcluding\":\"473.81\",\"matchCriteriaId\":\"9E31C0C2-5C06-4E5E-9106-1ABE98D37C13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"511.09\",\"versionEndExcluding\":\"513.46\",\"matchCriteriaId\":\"094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"516.25\",\"versionEndExcluding\":\"516.94\",\"matchCriteriaId\":\"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1ED5DE2-7677-4F38-8177-3BF0B3D03A09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"451.48\",\"versionEndExcluding\":\"453.64\",\"matchCriteriaId\":\"CE6F7210-C895-478D-8155-85335EFEAE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"471.11\",\"versionEndExcluding\":\"472.81\",\"matchCriteriaId\":\"D66D8563-40B2-4B35-BC8B-C2905C9D4FC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"511.09\",\"versionEndExcluding\":\"513.46\",\"matchCriteriaId\":\"094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"516.25\",\"versionEndExcluding\":\"516.94\",\"matchCriteriaId\":\"337FAC23-CA17-4B2C-AFC0-F3FD8493FACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75C6DE26-88F2-428E-B761-754BD027E015\"}]}]}],\"references\":[{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202310-02\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202310-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202310-02\", \"name\": \"GLSA-202310-02\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T09:15:15.715Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-34665\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-29T19:16:36.385458Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-29T19:16:40.307Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"NVIDIA\", \"product\": \"NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions prior to the August 2022 release\"}]}], \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5383\"}, {\"url\": \"https://security.gentoo.org/glsa/202310-02\", \"name\": \"GLSA-202310-02\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"shortName\": \"nvidia\", \"dateUpdated\": \"2023-10-03T14:06:32.855Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-34665\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-29T19:16:43.538Z\", \"dateReserved\": \"2022-06-27T00:00:00.000Z\", \"assignerOrgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"datePublished\": \"2022-11-18T00:00:00.000Z\", \"assignerShortName\": \"nvidia\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-HWG2-4PQ6-P2CF
Vulnerability from github – Published: 2022-11-19 00:30 – Updated: 2022-11-29 18:30NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
{
"affected": [],
"aliases": [
"CVE-2022-34665"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-11-19T00:15:00Z",
"severity": "MODERATE"
},
"details": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.",
"id": "GHSA-hwg2-4pq6-p2cf",
"modified": "2022-11-29T18:30:19Z",
"published": "2022-11-19T00:30:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34665"
},
{
"type": "WEB",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202310-02"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2022-0894
Vulnerability from csaf_certbund - Published: 2022-08-02 22:00 - Updated: 2023-10-03 22:00Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgemäßen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuführen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Nvidia Treiber GPU Display Driver for Windows
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows
|
— | |
|
Nvidia Treiber vGPU software
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:vgpu_software
|
— | |
|
Nvidia Treiber GPU Display Driver for Linux
Nvidia / Treiber
|
cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "NVidia ist ein Hersteller von Grafikkarten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Nvidia GPU Treiber ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0894 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0894.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0894 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0894"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202310-02 vom 2023-10-03",
"url": "https://security.gentoo.org/glsa/202310-02"
},
{
"category": "external",
"summary": "Security Bulletin: NVIDIA GPU Display Driver - August 2022 vom 2022-08-02",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5547-1 vom 2022-08-04",
"url": "https://ubuntu.com/security/notices/USN-5547-1"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-91370 vom 2022-08-14",
"url": "https://support.lenovo.com/us/en/product_security/LEN-91370"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2022-222 vom 2022-09-20",
"url": "https://www.dell.com/support/kbdoc/de-de/000202225/dsa-2022-222-dell-client-platform-security-update-for-nvidia-gpu-display-driver-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Nvidia GPU Treiber und NVIDIA vGPU software: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-10-03T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:32:45.265+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0894",
"initial_release_date": "2022-08-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-08-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-08-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-08-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von LENOVO aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2023-10-03T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Nvidia Treiber GPU Display Driver for Windows",
"product": {
"name": "Nvidia Treiber GPU Display Driver for Windows",
"product_id": "T024153",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:gpu_display_driver_for_windows"
}
}
},
{
"category": "product_name",
"name": "Nvidia Treiber GPU Display Driver for Linux",
"product": {
"name": "Nvidia Treiber GPU Display Driver for Linux",
"product_id": "T024154",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:gpu_display_driver_for_linux"
}
}
},
{
"category": "product_name",
"name": "Nvidia Treiber vGPU software",
"product": {
"name": "Nvidia Treiber vGPU software",
"product_id": "T024155",
"product_identification_helper": {
"cpe": "cpe:/a:nvidia:display_driver:vgpu_software"
}
}
}
],
"category": "product_name",
"name": "Treiber"
}
],
"category": "vendor",
"name": "Nvidia"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-31606",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31606"
},
{
"cve": "CVE-2022-31607",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31607"
},
{
"cve": "CVE-2022-31608",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31608"
},
{
"cve": "CVE-2022-31609",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31609"
},
{
"cve": "CVE-2022-31610",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31610"
},
{
"cve": "CVE-2022-31612",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31612"
},
{
"cve": "CVE-2022-31613",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31613"
},
{
"cve": "CVE-2022-31614",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31614"
},
{
"cve": "CVE-2022-31615",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31615"
},
{
"cve": "CVE-2022-31616",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31616"
},
{
"cve": "CVE-2022-31617",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31617"
},
{
"cve": "CVE-2022-31618",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-31618"
},
{
"cve": "CVE-2022-34665",
"notes": [
{
"category": "description",
"text": "Im Nvidia GPU Treiber existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund eines Out-of-Bounds-Zugriffs, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-Bounds-Lese- und Schreibvorgangs und mehrerer NULL-Zeiger-Dereferenzen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Daten zu manipulieren und beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T006498",
"T006520",
"T000126",
"T012167",
"T024153",
"T024155",
"T024154"
]
},
"release_date": "2022-08-02T22:00:00.000+00:00",
"title": "CVE-2022-34665"
}
]
}
BDU:2025-04598
Vulnerability from fstec - Published: 02.08.2022{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "NVIDIA Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 516.94 (NVIDIA RTX/Quadro R515), \u0434\u043e 516.94 (NVS R515), \u0434\u043e 516.94 (Tesla R515), \u0434\u043e 513.46 (NVIDIA RTX/Quadro R510), \u0434\u043e 513.46 (NVS R510), \u0434\u043e 513.46 (Tesla R510), \u0434\u043e 473.81 (GeForce R470), \u0434\u043e 473.81 (NVIDIA RTX/Quadro R470), \u0434\u043e 453.64 (Tesla R450), \u0434\u043e 516.94 (GeForce R515), \u0434\u043e 516.94 (Studio R515), \u0434\u043e 473.81 (NVS R470), \u0434\u043e 472.81 (Tesla R470), \u043e\u0442 11.0 \u0434\u043e 11.9 (vGPU), \u043e\u0442 13.0 \u0434\u043e 13.4 (vGPU), \u043e\u0442 14.0 \u0434\u043e 14.2 (vGPU), \u0434\u043e 516.94 (Cloud Gaming Guest Driver), \u0434\u043e 515.65.01 (Cloud Gaming Guest Driver), \u0434\u043e 515.65.01 (Cloud Gaming Virtual GPU Manager)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "02.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "15.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.04.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-04598",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-34665",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "NVIDIA RTX/Quadro R515, NVS R515, Tesla R515, NVIDIA RTX/Quadro R510, NVS R510, Tesla R510, GeForce R470, NVIDIA RTX/Quadro R470, Tesla R450, GeForce R515, Studio R515, NVS R470, Tesla R470, vGPU, Cloud Gaming Guest Driver, Cloud Gaming Virtual GPU Manager",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux - , Microsoft Corp Windows - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0440\u0435\u0436\u0438\u043c\u0430 \u044f\u0434\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 NVIDIA GeForce, Quadro, NVS \u0438 Tesla, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0440\u0435\u0436\u0438\u043c\u0430 \u044f\u0434\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 NVIDIA GeForce, Quadro, NVS \u0438 Tesla \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f Lenovo",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.lansweeper.com/vulnerability/nvidia-fixes-11-gpu-display-driver-vulnerabilities/\nhttps://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
GSD-2022-34665
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-34665",
"description": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.",
"id": "GSD-2022-34665"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-34665"
],
"details": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.",
"id": "GSD-2022-34665",
"modified": "2023-12-13T01:19:18.630539Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2022-34665",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)",
"version": {
"version_data": [
{
"version_value": "All versions prior to the August 2022 release"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.5",
"baseSeverity": "Medium",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"name": "GLSA-202310-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202310-02"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "473.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.8",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:cloud_gaming_guest:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "516.94",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "473.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "513.46",
"versionStartIncluding": "511.09",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "453.64",
"versionStartIncluding": "451.48",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "472.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "513.46",
"versionStartIncluding": "511.09",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2022-34665"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"name": "GLSA-202310-02",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-02"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
},
"lastModifiedDate": "2023-10-15T02:05Z",
"publishedDate": "2022-11-19T00:15Z"
}
}
}
FKIE_CVE-2022-34665
Vulnerability from fkie_nvd - Published: 2022-11-19 00:15 - Updated: 2024-11-21 07:096.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@nvidia.com | https://nvidia.custhelp.com/app/answers/detail/a_id/5383 | Patch, Vendor Advisory | |
| psirt@nvidia.com | https://security.gentoo.org/glsa/202310-02 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://nvidia.custhelp.com/app/answers/detail/a_id/5383 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | geforce | - | |
| nvidia | virtual_gpu | * | |
| nvidia | virtual_gpu | * | |
| nvidia | virtual_gpu | 14.0 | |
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| nvidia | cloud_gaming_guest | * | |
| microsoft | windows | - | |
| nvidia | gpu_display_driver | * | |
| nvidia | studio | - | |
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | studio | - | |
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | gpu_display_driver | * | |
| nvidia | tesla | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "9E31C0C2-5C06-4E5E-9106-1ABE98D37C13",
"versionEndExcluding": "473.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "337FAC23-CA17-4B2C-AFC0-F3FD8493FACD",
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B30520A-D378-4CC8-812D-3B443740D6E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45F338C5-245D-4D10-9B48-B56B7094F167",
"versionEndExcluding": "11.8",
"versionStartIncluding": "11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C8F13F-2F8F-4BAE-B971-582084B93D58",
"versionEndExcluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB2F728-3BFD-418D-AC29-A4165D1E7CA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:cloud_gaming_guest:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D619D0D6-04FF-4C1E-84BC-BF44C3328451",
"versionEndExcluding": "516.94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "337FAC23-CA17-4B2C-AFC0-F3FD8493FACD",
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "9E31C0C2-5C06-4E5E-9106-1ABE98D37C13",
"versionEndExcluding": "473.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88",
"versionEndExcluding": "513.46",
"versionStartIncluding": "511.09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "337FAC23-CA17-4B2C-AFC0-F3FD8493FACD",
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "CE6F7210-C895-478D-8155-85335EFEAE4F",
"versionEndExcluding": "453.64",
"versionStartIncluding": "451.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "D66D8563-40B2-4B35-BC8B-C2905C9D4FC8",
"versionEndExcluding": "472.81",
"versionStartIncluding": "471.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "094B9003-EEC7-46DD-AEC2-F2BCB0F8DE88",
"versionEndExcluding": "513.46",
"versionStartIncluding": "511.09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "337FAC23-CA17-4B2C-AFC0-F3FD8493FACD",
"versionEndExcluding": "516.94",
"versionStartIncluding": "516.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75C6DE26-88F2-428E-B761-754BD027E015",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service."
},
{
"lang": "es",
"value": "NVIDIA GPU Display Driver para Windows y Linux contiene una vulnerabilidad en la capa del modo kernel, donde un usuario local con capacidades b\u00e1sicas puede provocar una desreferencia del puntero nulo, lo que puede provocar una Denegaci\u00f3n de Servicio (DoS)."
}
],
"id": "CVE-2022-34665",
"lastModified": "2024-11-21T07:09:56.200",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "psirt@nvidia.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-19T00:15:27.557",
"references": [
{
"source": "psirt@nvidia.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"source": "psirt@nvidia.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-02"
}
],
"sourceIdentifier": "psirt@nvidia.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "psirt@nvidia.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.