Access Restriction Bypass Affecting nvidia-graphics-drivers package, versions <367.57-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-NVIDIAGRAPHICSDRIVERS-385449
  • published8 Nov 2016
  • disclosed8 Nov 2016

Introduced: 8 Nov 2016

CVE-2016-7389  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:9 nvidia-graphics-drivers to version 367.57-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nvidia-graphics-drivers package and not the nvidia-graphics-drivers package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

For the NVIDIA Quadro, NVS, GeForce, and Tesla products, NVIDIA GPU Display Driver on Linux R304 before 304.132, R340 before 340.98, R367 before 367.55, R361_93 before 361.93.03, and R370 before 370.28 contains a vulnerability in the kernel mode layer (nvidia.ko) handler for mmap() where improper input validation may allow users to gain access to arbitrary physical memory, leading to an escalation of privileges.