![]() NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer ( nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer ( nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. ![]() NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. ![]() NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer ( nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure. NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer ( nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards. This section provides a summary of potential vulnerabilities that this security update addresses and their impact.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |