2024-12-08 03:06:42 +00:00

185 lines
5.5 KiB
JSON

{
"id": "CVE-2021-1056",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2021-01-08T01:15:14.620",
"lastModified": "2024-11-21T05:43:28.547",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure."
},
{
"lang": "es",
"value": "NVIDIA GPU Display Driver para Linux, todas las versiones, contiene una vulnerabilidad en la capa del modo kernel (nvidia.ko) en la que no respeta completamente los permisos del sistema de archivos del sistema operativo para proporcionar aislamiento a nivel de dispositivo de GPU, lo que puede conllevar a una denegaci\u00f3n de servicio o divulgaci\u00f3n de informaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"baseScore": 3.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "390",
"versionEndExcluding": "390.141",
"matchCriteriaId": "D3F8BB68-C2C5-4F08-83C8-4FA15820F340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "450",
"versionEndExcluding": "450.102.04",
"matchCriteriaId": "9549CBBA-2F6F-4A64-8E5B-7717332F74DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "460",
"versionEndExcluding": "460.32.03",
"matchCriteriaId": "81372853-B278-4AEE-A014-8238B4D4E338"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html",
"source": "psirt@nvidia.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5142",
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
"source": "psirt@nvidia.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5142",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}