MGASA-2022-0286

Source
https://advisories.mageia.org/MGASA-2022-0286.html
Import Source
https://advisories.mageia.org/MGASA-2022-0286.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0286
Related
Published
2022-08-18T18:45:48Z
Modified
2026-03-25T17:59:09.629175Z
Summary
Updated nvidia390 packages fix security vulnerabilities
Details

Updated nvidia390 packages fix security vulnerabilities:

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure (CVE‑2022‑31607).

NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering (CVE‑2022‑31608).

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null- pointer dereference, which may lead to denial of service (CVE‑2022‑31615).

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null- pointer dereference, which may lead to denial of service (CVE‑2022‑34665).

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service (CVE‑2022‑34666).

References
Credits

Affected packages

Mageia:8 / nvidia390

Package

Name
nvidia390
Purl
pkg:rpm/mageia/nvidia390?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
390.154-1.mga8.nonfree

Ecosystem specific

{
    "section": "nonfree"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2022-0286.json"