CVE Vulnerabilities

CVE-2024-0077

Improper Authorization

Published: Mar 27, 2024 | Modified: Mar 28, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

Weakness

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Affected Software

Name Vendor Start Version End Version
Nvidia-graphics-drivers-304 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-340 Ubuntu focal *
Nvidia-graphics-drivers-340-updates Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-352 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-352-updates Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-361 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-367 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-375 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-384 Ubuntu esm-apps/xenial *
Nvidia-graphics-drivers-384 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-390 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-390 Ubuntu focal *
Nvidia-graphics-drivers-390 Ubuntu jammy *
Nvidia-graphics-drivers-418-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-418-server Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-418-server Ubuntu focal *
Nvidia-graphics-drivers-418-server Ubuntu jammy *
Nvidia-graphics-drivers-430 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-430 Ubuntu focal *
Nvidia-graphics-drivers-430 Ubuntu jammy *
Nvidia-graphics-drivers-430 Ubuntu mantic *
Nvidia-graphics-drivers-435 Ubuntu esm-apps/jammy *
Nvidia-graphics-drivers-435 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-435 Ubuntu focal *
Nvidia-graphics-drivers-435 Ubuntu jammy *
Nvidia-graphics-drivers-435 Ubuntu mantic *
Nvidia-graphics-drivers-440 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-440 Ubuntu focal *
Nvidia-graphics-drivers-440 Ubuntu jammy *
Nvidia-graphics-drivers-440 Ubuntu mantic *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/jammy *
Nvidia-graphics-drivers-440-server Ubuntu focal *
Nvidia-graphics-drivers-440-server Ubuntu jammy *
Nvidia-graphics-drivers-450 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-450 Ubuntu focal *
Nvidia-graphics-drivers-450 Ubuntu jammy *
Nvidia-graphics-drivers-450 Ubuntu mantic *
Nvidia-graphics-drivers-450-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-450-server Ubuntu focal *
Nvidia-graphics-drivers-450-server Ubuntu jammy *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/focal *
Nvidia-graphics-drivers-455 Ubuntu focal *
Nvidia-graphics-drivers-455 Ubuntu jammy *
Nvidia-graphics-drivers-455 Ubuntu mantic *
Nvidia-graphics-drivers-460 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460 Ubuntu focal *
Nvidia-graphics-drivers-460 Ubuntu jammy *
Nvidia-graphics-drivers-460 Ubuntu mantic *
Nvidia-graphics-drivers-460-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460-server Ubuntu focal *
Nvidia-graphics-drivers-470 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-470 Ubuntu focal *
Nvidia-graphics-drivers-470 Ubuntu jammy *
Nvidia-graphics-drivers-470 Ubuntu mantic *
Nvidia-graphics-drivers-470 Ubuntu noble *
Nvidia-graphics-drivers-470 Ubuntu upstream *
Nvidia-graphics-drivers-470-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-470-server Ubuntu focal *
Nvidia-graphics-drivers-470-server Ubuntu jammy *
Nvidia-graphics-drivers-470-server Ubuntu mantic *
Nvidia-graphics-drivers-470-server Ubuntu noble *
Nvidia-graphics-drivers-470-server Ubuntu upstream *
Nvidia-graphics-drivers-495 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-510 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-510 Ubuntu focal *
Nvidia-graphics-drivers-510 Ubuntu jammy *
Nvidia-graphics-drivers-510 Ubuntu mantic *
Nvidia-graphics-drivers-510-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-515 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-515 Ubuntu focal *
Nvidia-graphics-drivers-515 Ubuntu jammy *
Nvidia-graphics-drivers-515 Ubuntu mantic *
Nvidia-graphics-drivers-515-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-515-server Ubuntu focal *
Nvidia-graphics-drivers-515-server Ubuntu jammy *
Nvidia-graphics-drivers-515-server Ubuntu mantic *
Nvidia-graphics-drivers-520 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-520 Ubuntu focal *
Nvidia-graphics-drivers-520 Ubuntu jammy *
Nvidia-graphics-drivers-530 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-530 Ubuntu focal *
Nvidia-graphics-drivers-530 Ubuntu jammy *
Nvidia-graphics-drivers-530 Ubuntu mantic *
Nvidia-graphics-drivers-535 Ubuntu devel *
Nvidia-graphics-drivers-535 Ubuntu focal *
Nvidia-graphics-drivers-535 Ubuntu jammy *
Nvidia-graphics-drivers-535 Ubuntu mantic *
Nvidia-graphics-drivers-535 Ubuntu noble *
Nvidia-graphics-drivers-535 Ubuntu oracular *
Nvidia-graphics-drivers-535 Ubuntu upstream *
Nvidia-graphics-drivers-535-server Ubuntu devel *
Nvidia-graphics-drivers-535-server Ubuntu focal *
Nvidia-graphics-drivers-535-server Ubuntu jammy *
Nvidia-graphics-drivers-535-server Ubuntu mantic *
Nvidia-graphics-drivers-535-server Ubuntu noble *
Nvidia-graphics-drivers-535-server Ubuntu oracular *
Nvidia-graphics-drivers-535-server Ubuntu upstream *

Extended Description

Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.

Potential Mitigations

  • Divide the product into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully mapping roles with data and functionality. Use role-based access control (RBAC) to enforce the roles at the appropriate boundaries.
  • Note that this approach may not protect against horizontal authorization, i.e., it will not protect a user from attacking others with the same role.
  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, consider using authorization frameworks such as the JAAS Authorization Framework [REF-233] and the OWASP ESAPI Access Control feature [REF-45].
  • For web applications, make sure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access any unauthorized functionality or information by simply requesting direct access to that page.
  • One way to do this is to ensure that all pages containing sensitive information are not cached, and that all such pages restrict access to requests that are accompanied by an active and authenticated session token associated with a user who has the required permissions to access that page.

References