First published: Sat Apr 01 2023(Updated: )
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU | <11.12 | |
NVIDIA Virtual GPU | >=13.0<13.7 | |
NVIDIA Virtual GPU | >=15.0<15.2 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NVIDIA GPU Display Driver vulnerability is CVE-2023-0188.
The severity of CVE-2023-0188 is medium with a severity value of 5.5.
This vulnerability affects versions of NVIDIA Virtual GPU software up to and including 11.12, 13.0 to 13.7, and 15.0 to 15.2, causing a denial of service.
No, Citrix Hypervisor, Linux kernel, Microsoft Windows, Redhat Enterprise Linux Kernel-based Virtual Machine, and VMware Vsphere are not affected by this vulnerability.
More information about this vulnerability can be found at the following references: [https://nvidia.custhelp.com/app/answers/detail/a_id/5452](https://nvidia.custhelp.com/app/answers/detail/a_id/5452) and [https://security.gentoo.org/glsa/202310-02](https://security.gentoo.org/glsa/202310-02).