CVE Vulnerabilities

CVE-2021-1056

Incorrect Default Permissions

Published: Jan 08, 2021 | Modified: Oct 13, 2023
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.

Weakness

During installation, installed file permissions are set to allow anyone to modify those files.

Affected Software

Name Vendor Start Version End Version
Gpu_driver Nvidia 390 (including) 390.141 (excluding)
Gpu_driver Nvidia 450 (including) 450.102.04 (excluding)
Gpu_driver Nvidia 460 (including) 460.32.03 (excluding)
Nvidia-graphics-drivers-390 Ubuntu bionic *
Nvidia-graphics-drivers-390 Ubuntu devel *
Nvidia-graphics-drivers-390 Ubuntu focal *
Nvidia-graphics-drivers-390 Ubuntu groovy *
Nvidia-graphics-drivers-390 Ubuntu trusty *
Nvidia-graphics-drivers-418-server Ubuntu bionic *
Nvidia-graphics-drivers-418-server Ubuntu devel *
Nvidia-graphics-drivers-418-server Ubuntu focal *
Nvidia-graphics-drivers-418-server Ubuntu groovy *
Nvidia-graphics-drivers-418-server Ubuntu trusty *
Nvidia-graphics-drivers-440-server Ubuntu bionic *
Nvidia-graphics-drivers-440-server Ubuntu devel *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-440-server Ubuntu focal *
Nvidia-graphics-drivers-440-server Ubuntu groovy *
Nvidia-graphics-drivers-440-server Ubuntu trusty *
Nvidia-graphics-drivers-450 Ubuntu bionic *
Nvidia-graphics-drivers-450 Ubuntu devel *
Nvidia-graphics-drivers-450 Ubuntu focal *
Nvidia-graphics-drivers-450 Ubuntu groovy *
Nvidia-graphics-drivers-450 Ubuntu trusty *
Nvidia-graphics-drivers-450-server Ubuntu bionic *
Nvidia-graphics-drivers-450-server Ubuntu devel *
Nvidia-graphics-drivers-450-server Ubuntu focal *
Nvidia-graphics-drivers-450-server Ubuntu groovy *
Nvidia-graphics-drivers-450-server Ubuntu trusty *
Nvidia-graphics-drivers-455 Ubuntu bionic *
Nvidia-graphics-drivers-455 Ubuntu devel *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-455 Ubuntu focal *
Nvidia-graphics-drivers-455 Ubuntu groovy *
Nvidia-graphics-drivers-455 Ubuntu trusty *
Nvidia-graphics-drivers-455 Ubuntu upstream *
Nvidia-graphics-drivers-460 Ubuntu bionic *
Nvidia-graphics-drivers-460 Ubuntu devel *
Nvidia-graphics-drivers-460 Ubuntu focal *
Nvidia-graphics-drivers-460 Ubuntu groovy *
Nvidia-graphics-drivers-460 Ubuntu trusty *

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References