CVE Vulnerabilities

CVE-2023-0195

Improper Validation of Specified Quantity in Input

Published: Apr 01, 2023 | Modified: Nov 21, 2024
CVSS 3.x
2.4
LOW
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver

Weakness

The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.

Affected Software

Name Vendor Start Version End Version
Virtual_gpu Nvidia * 11.12 (excluding)
Virtual_gpu Nvidia 13.0 (including) 13.7 (excluding)
Virtual_gpu Nvidia 15.0 (including) 15.2 (excluding)
Nvidia-graphics-drivers-304 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-304 Ubuntu trusty *
Nvidia-graphics-drivers-304 Ubuntu xenial *
Nvidia-graphics-drivers-304-updates Ubuntu trusty *
Nvidia-graphics-drivers-304-updates Ubuntu xenial *
Nvidia-graphics-drivers-340 Ubuntu bionic *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-340 Ubuntu focal *
Nvidia-graphics-drivers-340 Ubuntu trusty *
Nvidia-graphics-drivers-340 Ubuntu xenial *
Nvidia-graphics-drivers-340-updates Ubuntu trusty *
Nvidia-graphics-drivers-352 Ubuntu trusty *
Nvidia-graphics-drivers-352-updates Ubuntu trusty *
Nvidia-graphics-drivers-367 Ubuntu trusty *
Nvidia-graphics-drivers-375 Ubuntu trusty *
Nvidia-graphics-drivers-384 Ubuntu esm-apps/xenial *
Nvidia-graphics-drivers-384 Ubuntu trusty *
Nvidia-graphics-drivers-384 Ubuntu xenial *
Nvidia-graphics-drivers-390 Ubuntu bionic *
Nvidia-graphics-drivers-390 Ubuntu devel *
Nvidia-graphics-drivers-390 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-390 Ubuntu focal *
Nvidia-graphics-drivers-390 Ubuntu jammy *
Nvidia-graphics-drivers-390 Ubuntu kinetic *
Nvidia-graphics-drivers-390 Ubuntu lunar *
Nvidia-graphics-drivers-418-server Ubuntu bionic *
Nvidia-graphics-drivers-418-server Ubuntu devel *
Nvidia-graphics-drivers-418-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-418-server Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-418-server Ubuntu focal *
Nvidia-graphics-drivers-418-server Ubuntu jammy *
Nvidia-graphics-drivers-430 Ubuntu bionic *
Nvidia-graphics-drivers-430 Ubuntu devel *
Nvidia-graphics-drivers-430 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-430 Ubuntu focal *
Nvidia-graphics-drivers-430 Ubuntu jammy *
Nvidia-graphics-drivers-430 Ubuntu kinetic *
Nvidia-graphics-drivers-430 Ubuntu lunar *
Nvidia-graphics-drivers-435 Ubuntu bionic *
Nvidia-graphics-drivers-435 Ubuntu devel *
Nvidia-graphics-drivers-435 Ubuntu esm-apps/jammy *
Nvidia-graphics-drivers-435 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-435 Ubuntu focal *
Nvidia-graphics-drivers-435 Ubuntu jammy *
Nvidia-graphics-drivers-435 Ubuntu kinetic *
Nvidia-graphics-drivers-435 Ubuntu lunar *
Nvidia-graphics-drivers-440 Ubuntu bionic *
Nvidia-graphics-drivers-440 Ubuntu devel *
Nvidia-graphics-drivers-440 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-440 Ubuntu focal *
Nvidia-graphics-drivers-440 Ubuntu jammy *
Nvidia-graphics-drivers-440 Ubuntu kinetic *
Nvidia-graphics-drivers-440 Ubuntu lunar *
Nvidia-graphics-drivers-440-server Ubuntu bionic *
Nvidia-graphics-drivers-440-server Ubuntu devel *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/jammy *
Nvidia-graphics-drivers-440-server Ubuntu focal *
Nvidia-graphics-drivers-440-server Ubuntu jammy *
Nvidia-graphics-drivers-440-server Ubuntu kinetic *
Nvidia-graphics-drivers-440-server Ubuntu lunar *
Nvidia-graphics-drivers-450 Ubuntu bionic *
Nvidia-graphics-drivers-450 Ubuntu devel *
Nvidia-graphics-drivers-450 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-450 Ubuntu focal *
Nvidia-graphics-drivers-450 Ubuntu jammy *
Nvidia-graphics-drivers-450 Ubuntu kinetic *
Nvidia-graphics-drivers-450 Ubuntu lunar *
Nvidia-graphics-drivers-450-server Ubuntu bionic *
Nvidia-graphics-drivers-450-server Ubuntu devel *
Nvidia-graphics-drivers-450-server Ubuntu focal *
Nvidia-graphics-drivers-450-server Ubuntu jammy *
Nvidia-graphics-drivers-450-server Ubuntu kinetic *
Nvidia-graphics-drivers-450-server Ubuntu lunar *
Nvidia-graphics-drivers-455 Ubuntu bionic *
Nvidia-graphics-drivers-455 Ubuntu devel *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-455 Ubuntu focal *
Nvidia-graphics-drivers-455 Ubuntu jammy *
Nvidia-graphics-drivers-455 Ubuntu kinetic *
Nvidia-graphics-drivers-455 Ubuntu lunar *
Nvidia-graphics-drivers-460 Ubuntu bionic *
Nvidia-graphics-drivers-460 Ubuntu devel *
Nvidia-graphics-drivers-460 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460 Ubuntu focal *
Nvidia-graphics-drivers-460 Ubuntu jammy *
Nvidia-graphics-drivers-460 Ubuntu kinetic *
Nvidia-graphics-drivers-460 Ubuntu lunar *
Nvidia-graphics-drivers-460-server Ubuntu bionic *
Nvidia-graphics-drivers-460-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460-server Ubuntu focal *
Nvidia-graphics-drivers-470 Ubuntu bionic *
Nvidia-graphics-drivers-470 Ubuntu devel *
Nvidia-graphics-drivers-470 Ubuntu focal *
Nvidia-graphics-drivers-470 Ubuntu jammy *
Nvidia-graphics-drivers-470 Ubuntu kinetic *
Nvidia-graphics-drivers-470 Ubuntu lunar *
Nvidia-graphics-drivers-470-server Ubuntu bionic *
Nvidia-graphics-drivers-470-server Ubuntu devel *
Nvidia-graphics-drivers-470-server Ubuntu focal *
Nvidia-graphics-drivers-470-server Ubuntu jammy *
Nvidia-graphics-drivers-470-server Ubuntu kinetic *
Nvidia-graphics-drivers-470-server Ubuntu lunar *
Nvidia-graphics-drivers-510 Ubuntu bionic *
Nvidia-graphics-drivers-510 Ubuntu devel *
Nvidia-graphics-drivers-510 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-510 Ubuntu focal *
Nvidia-graphics-drivers-510 Ubuntu jammy *
Nvidia-graphics-drivers-510 Ubuntu kinetic *
Nvidia-graphics-drivers-510 Ubuntu lunar *
Nvidia-graphics-drivers-515 Ubuntu bionic *
Nvidia-graphics-drivers-515 Ubuntu devel *
Nvidia-graphics-drivers-515 Ubuntu focal *
Nvidia-graphics-drivers-515 Ubuntu jammy *
Nvidia-graphics-drivers-515 Ubuntu kinetic *
Nvidia-graphics-drivers-515 Ubuntu lunar *
Nvidia-graphics-drivers-515-server Ubuntu bionic *
Nvidia-graphics-drivers-515-server Ubuntu devel *
Nvidia-graphics-drivers-515-server Ubuntu focal *
Nvidia-graphics-drivers-515-server Ubuntu jammy *
Nvidia-graphics-drivers-515-server Ubuntu kinetic *
Nvidia-graphics-drivers-515-server Ubuntu lunar *
Nvidia-graphics-drivers-520 Ubuntu bionic *
Nvidia-graphics-drivers-520 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-520 Ubuntu focal *
Nvidia-graphics-drivers-520 Ubuntu jammy *
Nvidia-graphics-drivers-520 Ubuntu kinetic *
Nvidia-graphics-drivers-525 Ubuntu bionic *
Nvidia-graphics-drivers-525 Ubuntu devel *
Nvidia-graphics-drivers-525 Ubuntu focal *
Nvidia-graphics-drivers-525 Ubuntu jammy *
Nvidia-graphics-drivers-525 Ubuntu kinetic *
Nvidia-graphics-drivers-525 Ubuntu lunar *
Nvidia-graphics-drivers-525-server Ubuntu bionic *
Nvidia-graphics-drivers-525-server Ubuntu devel *
Nvidia-graphics-drivers-525-server Ubuntu focal *
Nvidia-graphics-drivers-525-server Ubuntu jammy *
Nvidia-graphics-drivers-525-server Ubuntu kinetic *
Nvidia-graphics-drivers-525-server Ubuntu lunar *

Extended Description

Specified quantities include size, length, frequency, price, rate, number of operations, time, and others. Code may rely on specified quantities to allocate resources, perform calculations, control iteration, etc. When the quantity is not properly validated, then attackers can specify malicious quantities to cause excessive resource allocation, trigger unexpected failures, enable buffer overflows, etc.

Potential Mitigations

  • Assume all input is malicious. Use an “accept known good” input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
  • When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, “boat” may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as “red” or “blue.”
  • Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code’s environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.

References