Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-7869

Опубликовано: 24 нояб. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.6

Описание

Multiple integer overflows in the kernel mode driver for the NVIDIA GPU graphics driver R340 before 341.92, R352 before 354.35, and R358 before 358.87 on Windows and R304 before 304.131, R340 before 340.96, R352 before 352.63, and R358 before 358.16 on Linux allow local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors, which trigger uninitialized or out of bounds memory access. NOTE: this identifier has been SPLIT per ADT2 and ADT3 due to different vulnerability type and affected versions. See CVE-2015-8328 for the vulnerability in the NVAPI support layer in NVIDIA drivers for Windows.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

superseded
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

not-affected

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

released

304.131-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [304.131-0ubuntu0.14.04.1]]
precise

released

304.131-0ubuntu0.12.04.1
trusty

released

304.131-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [304.131-0ubuntu0.14.04.1]
upstream

released

304.131
vivid

released

304.131-0ubuntu0.15.04.1
wily

released

304.131-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

released

304.131-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [304.131-0ubuntu0.14.04.1]]
precise

released

304.131-0ubuntu0.12.04.1
trusty

released

304.131-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [304.131-0ubuntu0.14.04.1]
upstream

released

304.131
vivid

released

304.131-0ubuntu0.15.04.1
wily

released

304.131-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

not-affected

superseded
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [superseded]]
precise

DNE

trusty

not-affected

superseded
trusty/esm

DNE

trusty was not-affected [superseded]
upstream

needs-triage

vivid

not-affected

superseded
wily

not-affected

superseded

Показывать по

РелизСтатусПримечание
devel

not-affected

superseded
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [superseded]]
precise

not-affected

superseded
trusty

not-affected

superseded
trusty/esm

DNE

trusty was not-affected [superseded]
upstream

needs-triage

vivid

not-affected

superseded
wily

not-affected

superseded

Показывать по

РелизСтатусПримечание
devel

not-affected

superseded
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [superseded]]
precise

not-affected

superseded
trusty

not-affected

superseded
trusty/esm

DNE

trusty was not-affected [superseded]
upstream

needs-triage

vivid

not-affected

superseded
wily

not-affected

superseded

Показывать по

РелизСтатусПримечание
devel

not-affected

superseded
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [superseded]]
precise

not-affected

superseded
trusty

not-affected

superseded
trusty/esm

DNE

trusty was not-affected [superseded]
upstream

needs-triage

vivid

not-affected

superseded
wily

not-affected

superseded

Показывать по

РелизСтатусПримечание
devel

not-affected

superseded
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [superseded]]
precise

not-affected

superseded
trusty

not-affected

superseded
trusty/esm

DNE

trusty was not-affected [superseded]
upstream

needs-triage

vivid

not-affected

superseded
wily

not-affected

superseded

Показывать по

РелизСтатусПримечание
devel

released

340.96-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [340.96-0ubuntu0.14.04.1]]
precise

released

340.96-0ubuntu0.12.04.1
trusty

released

340.96-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [340.96-0ubuntu0.14.04.1]
upstream

released

340.96
vivid

released

340.96-0ubuntu0.15.04.1
wily

released

340.96-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

released

340.96-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [340.96-0ubuntu0.14.04.1]]
precise

released

340.96-0ubuntu0.12.04.1
trusty

released

340.96-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [340.96-0ubuntu0.14.04.1]
upstream

released

340.96
vivid

released

340.96-0ubuntu0.15.04.1
wily

released

340.96-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [352.63-0ubuntu0.14.04.1]]
precise

DNE

trusty

released

352.63-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [352.63-0ubuntu0.14.04.1]
upstream

needs-triage

vivid

released

352.63-0ubuntu0.15.04.1
wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [352.63-0ubuntu0.14.04.1]]
precise

DNE

trusty

released

352.63-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [352.63-0ubuntu0.14.04.1]
upstream

needs-triage

vivid

released

352.63-0ubuntu0.15.04.1
wily

DNE

Показывать по

РелизСтатусПримечание
devel

released

352.63-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

DNE

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

released

352.63
vivid

not-affected

wily

released

352.63-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

released

352.63-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

DNE

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

released

352.63
vivid

not-affected

wily

released

352.63-0ubuntu0.15.10.1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

superseded
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

superseded
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

superseded
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 18%
0.00057
Низкий

6.6 Medium

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

Multiple integer overflows in the kernel mode driver for the NVIDIA GPU graphics driver R340 before 341.92, R352 before 354.35, and R358 before 358.87 on Windows and R304 before 304.131, R340 before 340.96, R352 before 352.63, and R358 before 358.16 on Linux allow local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors, which trigger uninitialized or out of bounds memory access. NOTE: this identifier has been SPLIT per ADT2 and ADT3 due to different vulnerability type and affected versions. See CVE-2015-8328 for the vulnerability in the NVAPI support layer in NVIDIA drivers for Windows.

debian
около 10 лет назад

Multiple integer overflows in the kernel mode driver for the NVIDIA GP ...

github
больше 3 лет назад

Multiple integer overflows in the kernel mode driver for the NVIDIA GPU graphics driver R340 before 341.92, R352 before 354.35, and R358 before 358.87 on Windows and R304 before 304.131, R340 before 340.96, R352 before 352.63, and R358 before 358.16 on Linux allow local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors, which trigger uninitialized or out of bounds memory access. NOTE: this identifier has been SPLIT per ADT2 and ADT3 due to different vulnerability type and affected versions. See CVE-2015-8328 for the vulnerability in the NVAPI support layer in NVIDIA drivers for Windows.

fstec
около 10 лет назад

Уязвимость программного обеспечения графического процессора NVIDIA GPU, позволяющая нарушителю получить доступ к защищаемой информации, повысить свои привилегии или вызвать отказ в обслуживании

EPSS

Процентиль: 18%
0.00057
Низкий

6.6 Medium

CVSS2

Уязвимость CVE-2015-7869