First published: Tue Nov 24 2015(Updated: )
The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA GPU kernel driver | =346.16 | |
NVIDIA GPU kernel driver | =346.22 | |
NVIDIA GPU kernel driver | =346.35 | |
NVIDIA GPU kernel driver | =346.47 | |
NVIDIA GPU kernel driver | =346.59 | |
NVIDIA GPU kernel driver | =346.72 | |
NVIDIA GPU kernel driver | =346.82 | |
NVIDIA GPU kernel driver | =352.09 | |
NVIDIA GPU kernel driver | =352.21 | |
NVIDIA GPU kernel driver | =352.30 | |
NVIDIA GPU kernel driver | =352.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5053 has a critical severity level due to potential privilege escalation and denial of service risks.
To mitigate CVE-2015-5053, users should update their NVIDIA GPU drivers to versions 346.87 or later for the R346 branch and 352.46 or later for the R352 branch.
CVE-2015-5053 affects NVIDIA GPU Driver versions 346.16, 346.22, 346.35, 346.47, 346.59, 346.72, 346.82, 352.09, 352.21, and 352.41.
CVE-2015-5053 can allow attackers to escalate privileges and potentially cause a denial of service by accessing unauthorized device IO memory.
CVE-2015-5053 specifically affects Linux systems running the vulnerable versions of the NVIDIA GPU graphics driver.