CVE Vulnerabilities

CVE-2025-23244

Incorrect Authorization

Published: May 01, 2025 | Modified: May 01, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

Weakness

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

Affected Software

Name Vendor Start Version End Version
Nvidia-graphics-drivers-304 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-304 Ubuntu upstream *
Nvidia-graphics-drivers-304-updates Ubuntu upstream *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-340 Ubuntu esm-infra/xenial *
Nvidia-graphics-drivers-340 Ubuntu focal *
Nvidia-graphics-drivers-340 Ubuntu upstream *
Nvidia-graphics-drivers-340-updates Ubuntu upstream *
Nvidia-graphics-drivers-352 Ubuntu upstream *
Nvidia-graphics-drivers-352-updates Ubuntu upstream *
Nvidia-graphics-drivers-361 Ubuntu upstream *
Nvidia-graphics-drivers-367 Ubuntu upstream *
Nvidia-graphics-drivers-375 Ubuntu upstream *
Nvidia-graphics-drivers-384 Ubuntu upstream *
Nvidia-graphics-drivers-390 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-390 Ubuntu focal *
Nvidia-graphics-drivers-390 Ubuntu jammy *
Nvidia-graphics-drivers-390 Ubuntu upstream *
Nvidia-graphics-drivers-418-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-418-server Ubuntu focal *
Nvidia-graphics-drivers-418-server Ubuntu jammy *
Nvidia-graphics-drivers-418-server Ubuntu upstream *
Nvidia-graphics-drivers-430 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-430 Ubuntu focal *
Nvidia-graphics-drivers-430 Ubuntu jammy *
Nvidia-graphics-drivers-430 Ubuntu upstream *
Nvidia-graphics-drivers-435 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-435 Ubuntu focal *
Nvidia-graphics-drivers-435 Ubuntu jammy *
Nvidia-graphics-drivers-435 Ubuntu upstream *
Nvidia-graphics-drivers-440 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-440 Ubuntu focal *
Nvidia-graphics-drivers-440 Ubuntu jammy *
Nvidia-graphics-drivers-440 Ubuntu upstream *
Nvidia-graphics-drivers-440-server Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-440-server Ubuntu focal *
Nvidia-graphics-drivers-440-server Ubuntu jammy *
Nvidia-graphics-drivers-440-server Ubuntu upstream *
Nvidia-graphics-drivers-450 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-450 Ubuntu focal *
Nvidia-graphics-drivers-450 Ubuntu jammy *
Nvidia-graphics-drivers-450 Ubuntu upstream *
Nvidia-graphics-drivers-450-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-450-server Ubuntu focal *
Nvidia-graphics-drivers-450-server Ubuntu jammy *
Nvidia-graphics-drivers-450-server Ubuntu upstream *
Nvidia-graphics-drivers-455 Ubuntu esm-apps/bionic *
Nvidia-graphics-drivers-455 Ubuntu focal *
Nvidia-graphics-drivers-455 Ubuntu jammy *
Nvidia-graphics-drivers-455 Ubuntu upstream *
Nvidia-graphics-drivers-460 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460 Ubuntu focal *
Nvidia-graphics-drivers-460 Ubuntu jammy *
Nvidia-graphics-drivers-460 Ubuntu upstream *
Nvidia-graphics-drivers-460-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-460-server Ubuntu focal *
Nvidia-graphics-drivers-460-server Ubuntu upstream *
Nvidia-graphics-drivers-470 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-470 Ubuntu focal *
Nvidia-graphics-drivers-470 Ubuntu jammy *
Nvidia-graphics-drivers-470 Ubuntu noble *
Nvidia-graphics-drivers-470 Ubuntu upstream *
Nvidia-graphics-drivers-470-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-470-server Ubuntu focal *
Nvidia-graphics-drivers-470-server Ubuntu jammy *
Nvidia-graphics-drivers-470-server Ubuntu noble *
Nvidia-graphics-drivers-470-server Ubuntu upstream *
Nvidia-graphics-drivers-495 Ubuntu upstream *
Nvidia-graphics-drivers-510 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-510 Ubuntu focal *
Nvidia-graphics-drivers-510 Ubuntu jammy *
Nvidia-graphics-drivers-510 Ubuntu upstream *
Nvidia-graphics-drivers-515 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-515 Ubuntu focal *
Nvidia-graphics-drivers-515 Ubuntu jammy *
Nvidia-graphics-drivers-515 Ubuntu upstream *
Nvidia-graphics-drivers-515-server Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-515-server Ubuntu focal *
Nvidia-graphics-drivers-515-server Ubuntu jammy *
Nvidia-graphics-drivers-515-server Ubuntu upstream *
Nvidia-graphics-drivers-520 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-520 Ubuntu focal *
Nvidia-graphics-drivers-520 Ubuntu jammy *
Nvidia-graphics-drivers-520 Ubuntu upstream *
Nvidia-graphics-drivers-525 Ubuntu upstream *
Nvidia-graphics-drivers-525-server Ubuntu upstream *
Nvidia-graphics-drivers-530 Ubuntu esm-infra/bionic *
Nvidia-graphics-drivers-530 Ubuntu focal *
Nvidia-graphics-drivers-530 Ubuntu jammy *
Nvidia-graphics-drivers-530 Ubuntu upstream *
Nvidia-graphics-drivers-535 Ubuntu upstream *
Nvidia-graphics-drivers-535-server Ubuntu upstream *
Nvidia-graphics-drivers-545 Ubuntu jammy *
Nvidia-graphics-drivers-545 Ubuntu upstream *
Nvidia-graphics-drivers-550 Ubuntu upstream *
Nvidia-graphics-drivers-550-server Ubuntu upstream *
Nvidia-graphics-drivers-560 Ubuntu devel *
Nvidia-graphics-drivers-560 Ubuntu oracular *
Nvidia-graphics-drivers-560 Ubuntu plucky *
Nvidia-graphics-drivers-560 Ubuntu upstream *
Nvidia-graphics-drivers-565-server Ubuntu focal *
Nvidia-graphics-drivers-565-server Ubuntu jammy *
Nvidia-graphics-drivers-565-server Ubuntu noble *
Nvidia-graphics-drivers-565-server Ubuntu oracular *
Nvidia-graphics-drivers-565-server Ubuntu upstream *
Nvidia-graphics-drivers-570 Ubuntu upstream *
Nvidia-graphics-drivers-570-server Ubuntu upstream *

Extended Description

Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are incorrectly applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.

Potential Mitigations

  • Divide the product into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully mapping roles with data and functionality. Use role-based access control (RBAC) [REF-229] to enforce the roles at the appropriate boundaries.
  • Note that this approach may not protect against horizontal authorization, i.e., it will not protect a user from attacking others with the same role.
  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, consider using authorization frameworks such as the JAAS Authorization Framework [REF-233] and the OWASP ESAPI Access Control feature [REF-45].
  • For web applications, make sure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access any unauthorized functionality or information by simply requesting direct access to that page.
  • One way to do this is to ensure that all pages containing sensitive information are not cached, and that all such pages restrict access to requests that are accompanied by an active and authenticated session token associated with a user who has the required permissions to access that page.

References