Debian Package Tracker
Register | Log in
Subscribe

nvidia-graphics-drivers-legacy-390xx

Choose email to subscribe with

general
  • source: nvidia-graphics-drivers-legacy-390xx (non-free)
  • version: 390.157-12
  • maintainer: Debian NVIDIA Maintainers (archive) (DMD)
  • uploaders: Andreas Beckmann [DMD] – Luca Boccassi [DMD]
  • arch: amd64 armhf i386
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 390.154-1~deb10u1
  • o-o-sec: 390.157-1~deb10u1
  • oldstable: 390.157-1~deb11u1
  • old-bpo: 390.147-1~bpo11+1
  • unstable: 390.157-12
versioned links
  • 390.147-1~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.154-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libegl-nvidia-legacy-390xx0
  • libegl1-nvidia-legacy-390xx
  • libgl1-nvidia-legacy-390xx-glvnd-glx
  • libgl1-nvidia-legacy-390xx-glx
  • libgles-nvidia-legacy-390xx1
  • libgles-nvidia-legacy-390xx2
  • libglx-nvidia-legacy-390xx0
  • libnvidia-legacy-390xx-cfg1
  • libnvidia-legacy-390xx-compiler
  • libnvidia-legacy-390xx-cuda1
  • libnvidia-legacy-390xx-cuda1-i386
  • libnvidia-legacy-390xx-eglcore
  • libnvidia-legacy-390xx-encode1
  • libnvidia-legacy-390xx-fatbinaryloader
  • libnvidia-legacy-390xx-fbc1
  • libnvidia-legacy-390xx-glcore
  • libnvidia-legacy-390xx-ifr1
  • libnvidia-legacy-390xx-ml1
  • libnvidia-legacy-390xx-nvcuvid1
  • libnvidia-legacy-390xx-ptxjitcompiler1
  • nvidia-legacy-390xx-alternative
  • nvidia-legacy-390xx-driver (2 bugs: 0, 2, 0, 0)
  • nvidia-legacy-390xx-driver-bin
  • nvidia-legacy-390xx-driver-libs
  • nvidia-legacy-390xx-driver-libs-i386
  • nvidia-legacy-390xx-driver-libs-nonglvnd
  • nvidia-legacy-390xx-driver-libs-nonglvnd-i386
  • nvidia-legacy-390xx-egl-icd
  • nvidia-legacy-390xx-kernel-dkms
  • nvidia-legacy-390xx-kernel-source
  • nvidia-legacy-390xx-kernel-support
  • nvidia-legacy-390xx-nonglvnd-vulkan-icd
  • nvidia-legacy-390xx-opencl-icd
  • nvidia-legacy-390xx-smi
  • nvidia-legacy-390xx-vdpau-driver
  • nvidia-legacy-390xx-vulkan-icd
  • xserver-xorg-video-nvidia-legacy-390xx
action needed
24 security issues in sid high

There are 24 open security issues in sid.

24 important issues:
  • CVE-2023-0180: NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
  • CVE-2024-0074: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
  • CVE-2024-0078: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service.
  • CVE-2024-0090: NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0092: NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
  • CVE-2024-0126: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0131: NVIDIA GPU kernel driver for Windows and Linux contains a vulnerability where a potential user-mode attacker could read  a buffer with an incorrect length. A successful exploit of this vulnerability might lead to denial of service.
  • CVE-2024-0147: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where referencing memory after it has been freed can lead to denial of service or data tampering.
  • CVE-2024-0149: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.
  • CVE-2024-0150: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering.
  • CVE-2023-25515: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
  • CVE-2023-31022: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
  • CVE-2025-23244: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Created: 2023-04-01 Last update: 2025-05-02 05:00
19 security issues in buster high

There are 19 open security issues in buster.

5 important issues:
  • CVE-2024-0074: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
  • CVE-2024-0078: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service.
  • CVE-2024-0090: NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0092: NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
  • CVE-2024-42265:
4 issues postponed or untriaged:
  • CVE-2023-0180: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-25515: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
  • CVE-2023-31022: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
10 ignored issues:
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
Created: 2024-02-29 Last update: 2024-06-14 06:32
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 20-day delay is over. Check why.
Created: 2025-04-03 Last update: 2025-05-23 17:02
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-02-05 Last update: 2024-11-05 03:00
testing migrations
  • excuses:
    • Migrates after: nvidia-graphics-drivers-tesla-418
    • Migration status for nvidia-graphics-drivers-legacy-390xx (- to 390.157-12): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating nvidia-graphics-drivers-legacy-390xx would introduce bugs in testing: #1006719, #1033776, #1039680, #1055138, #1064985, #1072794, #1085970, #1093910, #1104070
    • ∙ ∙ blocked by freeze: is not in testing
    • ∙ ∙ Depends: nvidia-graphics-drivers-legacy-390xx nvidia-graphics-drivers-tesla-418 (not considered)
    • Additional info:
    • ∙ ∙ Cannot be tested by piuparts (not a blocker) - (no link yet)
    • ∙ ∙ autopkgtest for nvidia-graphics-drivers-legacy-390xx/390.157-12: amd64: No tests, superficial or marked flaky ♻, armhf: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻
    • ∙ ∙ 55 days old (needed 20 days)
    • ∙ ∙ Remove hint for (transitive) dependency: nvidia-graphics-drivers-tesla-470
    • Not considered
news
[rss feed]
  • [2025-03-29] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-12 (source) into unstable (Andreas Beckmann)
  • [2025-01-25] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-11 (source) into unstable (Andreas Beckmann)
  • [2024-12-21] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-10 (source) into unstable (Andreas Beckmann)
  • [2024-11-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-9 (source) into unstable (Andreas Beckmann)
  • [2024-07-26] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-8 (source) into unstable (Andreas Beckmann)
  • [2024-05-20] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-7 (source) into unstable (Andreas Beckmann)
  • [2023-11-13] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-6 (source) into unstable (Andreas Beckmann)
  • [2023-08-14] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-5 (source) into unstable (Andreas Beckmann)
  • [2023-08-02] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-4 (source) into unstable (Andreas Beckmann)
  • [2023-06-15] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-3 (source) into unstable (Andreas Beckmann)
  • [2023-05-11] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-1~deb10u1 (source amd64) into oldstable (Tobias Frost)
  • [2023-04-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-2 (source) into unstable (Andreas Beckmann)
  • [2023-02-04] nvidia-graphics-drivers-legacy-390xx REMOVED from testing (Debian testing watch)
  • [2022-12-09] nvidia-graphics-drivers-legacy-390xx 390.157-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-03] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-1 (source) into unstable (Andreas Beckmann)
  • [2022-10-26] nvidia-graphics-drivers-legacy-390xx 390.154-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-20] Accepted nvidia-graphics-drivers-legacy-390xx 390.154-2 (source) into unstable (Andreas Beckmann)
  • [2022-08-09] nvidia-graphics-drivers-legacy-390xx 390.154-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.154-1 (source) into unstable (Andreas Beckmann)
  • [2022-06-27] nvidia-graphics-drivers-legacy-390xx 390.151-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-22] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-2 (source) into unstable (Andreas Beckmann)
  • [2022-06-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1~deb10u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-06-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-05-24] nvidia-graphics-drivers-legacy-390xx 390.151-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1 (source) into unstable (Andreas Beckmann)
  • [2022-04-18] nvidia-graphics-drivers-legacy-390xx 390.147-4 MIGRATED to testing (Debian testing watch)
  • [2022-04-12] Accepted nvidia-graphics-drivers-legacy-390xx 390.147-4 (source) into unstable (Andreas Beckmann)
  • [2022-02-22] nvidia-graphics-drivers-legacy-390xx 390.147-3 MIGRATED to testing (Debian testing watch)
  • [2022-02-16] Accepted nvidia-graphics-drivers-legacy-390xx 390.147-3 (source) into unstable (Andreas Beckmann)
  • [2022-02-16] Accepted nvidia-graphics-drivers-legacy-390xx 390.147-2 (source) into unstable (Andreas Beckmann)
  • 1
  • 2
bugs [bug history graph]
  • all: 11
  • RC: 9
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing