Debian Package Tracker
Register | Log in
Subscribe

nvidia-graphics-drivers-legacy-390xx

Choose email to subscribe with

general
  • source: nvidia-graphics-drivers-legacy-390xx (non-free)
  • version: 390.157-13
  • maintainer: Debian NVIDIA Maintainers (archive) (DMD)
  • uploaders: Andreas Beckmann [DMD] – Luca Boccassi [DMD]
  • arch: amd64 armhf i386
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 390.154-1~deb10u1
  • o-o-sec: 390.157-1~deb10u1
  • oldstable: 390.157-1~deb11u1
  • old-bpo: 390.147-1~bpo11+1
  • unstable: 390.157-13
versioned links
  • 390.147-1~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.154-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-1~deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 390.157-13: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libegl-nvidia-legacy-390xx0
  • libegl1-nvidia-legacy-390xx
  • libgl1-nvidia-legacy-390xx-glvnd-glx
  • libgl1-nvidia-legacy-390xx-glx
  • libgles-nvidia-legacy-390xx1
  • libgles-nvidia-legacy-390xx2
  • libglx-nvidia-legacy-390xx0
  • libnvidia-legacy-390xx-cfg1
  • libnvidia-legacy-390xx-compiler
  • libnvidia-legacy-390xx-cuda1
  • libnvidia-legacy-390xx-cuda1-i386
  • libnvidia-legacy-390xx-eglcore
  • libnvidia-legacy-390xx-encode1
  • libnvidia-legacy-390xx-fatbinaryloader
  • libnvidia-legacy-390xx-fbc1
  • libnvidia-legacy-390xx-glcore
  • libnvidia-legacy-390xx-ifr1
  • libnvidia-legacy-390xx-ml1
  • libnvidia-legacy-390xx-nvcuvid1
  • libnvidia-legacy-390xx-ptxjitcompiler1
  • nvidia-legacy-390xx-alternative
  • nvidia-legacy-390xx-driver (2 bugs: 0, 2, 0, 0)
  • nvidia-legacy-390xx-driver-bin
  • nvidia-legacy-390xx-driver-libs
  • nvidia-legacy-390xx-driver-libs-i386
  • nvidia-legacy-390xx-driver-libs-nonglvnd
  • nvidia-legacy-390xx-driver-libs-nonglvnd-i386
  • nvidia-legacy-390xx-egl-icd
  • nvidia-legacy-390xx-kernel-dkms
  • nvidia-legacy-390xx-kernel-source
  • nvidia-legacy-390xx-kernel-support
  • nvidia-legacy-390xx-nonglvnd-vulkan-icd
  • nvidia-legacy-390xx-opencl-icd
  • nvidia-legacy-390xx-smi
  • nvidia-legacy-390xx-vdpau-driver
  • nvidia-legacy-390xx-vulkan-icd
  • xserver-xorg-video-nvidia-legacy-390xx
action needed
24 security issues in sid high

There are 24 open security issues in sid.

24 important issues:
  • CVE-2023-0180: NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
  • CVE-2024-0074: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
  • CVE-2024-0078: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service.
  • CVE-2024-0090: NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0092: NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
  • CVE-2024-0126: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0131: NVIDIA GPU kernel driver for Windows and Linux contains a vulnerability where a potential user-mode attacker could read  a buffer with an incorrect length. A successful exploit of this vulnerability might lead to denial of service.
  • CVE-2024-0147: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where referencing memory after it has been freed can lead to denial of service or data tampering.
  • CVE-2024-0149: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.
  • CVE-2024-0150: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering.
  • CVE-2023-25515: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
  • CVE-2023-31022: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
  • CVE-2025-23244: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Created: 2023-04-01 Last update: 2025-06-18 15:31
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-06-18 Last update: 2025-06-18 15:03
19 security issues in buster high

There are 19 open security issues in buster.

5 important issues:
  • CVE-2024-0074: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
  • CVE-2024-0078: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service.
  • CVE-2024-0090: NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0092: NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
  • CVE-2024-42265:
4 issues postponed or untriaged:
  • CVE-2023-0180: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-25515: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
  • CVE-2023-31022: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
10 ignored issues:
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
Created: 2024-02-29 Last update: 2024-06-14 06:32
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-02-05 Last update: 2024-11-05 03:00
testing migrations
  • excuses:
    • Migrates after: nvidia-graphics-drivers-tesla-418
    • Migration status for nvidia-graphics-drivers-legacy-390xx (- to 390.157-13): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating nvidia-graphics-drivers-legacy-390xx would introduce bugs in testing: #1006719, #1033776, #1039680, #1055138, #1064985, #1072794, #1085970, #1093910, #1104070
    • ∙ ∙ blocked by freeze: is not in testing
    • ∙ ∙ Too young, only 2 of 20 days old
    • ∙ ∙ Depends: nvidia-graphics-drivers-legacy-390xx nvidia-graphics-drivers-tesla-418 (not considered)
    • Additional info:
    • ∙ ∙ Cannot be tested by piuparts (not a blocker) - (no link yet)
    • ∙ ∙ autopkgtest for nvidia-graphics-drivers-legacy-390xx/390.157-13: amd64: No tests, superficial or marked flaky ♻, armhf: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻
    • Not considered
news
[rss feed]
  • [2025-06-18] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-13 (source) into unstable (Andreas Beckmann)
  • [2025-03-29] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-12 (source) into unstable (Andreas Beckmann)
  • [2025-01-25] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-11 (source) into unstable (Andreas Beckmann)
  • [2024-12-21] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-10 (source) into unstable (Andreas Beckmann)
  • [2024-11-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-9 (source) into unstable (Andreas Beckmann)
  • [2024-07-26] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-8 (source) into unstable (Andreas Beckmann)
  • [2024-05-20] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-7 (source) into unstable (Andreas Beckmann)
  • [2023-11-13] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-6 (source) into unstable (Andreas Beckmann)
  • [2023-08-14] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-5 (source) into unstable (Andreas Beckmann)
  • [2023-08-02] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-4 (source) into unstable (Andreas Beckmann)
  • [2023-06-15] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-3 (source) into unstable (Andreas Beckmann)
  • [2023-05-11] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-1~deb10u1 (source amd64) into oldstable (Tobias Frost)
  • [2023-04-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-2 (source) into unstable (Andreas Beckmann)
  • [2023-02-04] nvidia-graphics-drivers-legacy-390xx REMOVED from testing (Debian testing watch)
  • [2022-12-09] nvidia-graphics-drivers-legacy-390xx 390.157-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-03] Accepted nvidia-graphics-drivers-legacy-390xx 390.157-1 (source) into unstable (Andreas Beckmann)
  • [2022-10-26] nvidia-graphics-drivers-legacy-390xx 390.154-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-20] Accepted nvidia-graphics-drivers-legacy-390xx 390.154-2 (source) into unstable (Andreas Beckmann)
  • [2022-08-09] nvidia-graphics-drivers-legacy-390xx 390.154-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-04] Accepted nvidia-graphics-drivers-legacy-390xx 390.154-1 (source) into unstable (Andreas Beckmann)
  • [2022-06-27] nvidia-graphics-drivers-legacy-390xx 390.151-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-22] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-2 (source) into unstable (Andreas Beckmann)
  • [2022-06-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1~deb10u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-06-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-05-24] nvidia-graphics-drivers-legacy-390xx 390.151-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-19] Accepted nvidia-graphics-drivers-legacy-390xx 390.151-1 (source) into unstable (Andreas Beckmann)
  • [2022-04-18] nvidia-graphics-drivers-legacy-390xx 390.147-4 MIGRATED to testing (Debian testing watch)
  • [2022-04-12] Accepted nvidia-graphics-drivers-legacy-390xx 390.147-4 (source) into unstable (Andreas Beckmann)
  • [2022-02-22] nvidia-graphics-drivers-legacy-390xx 390.147-3 MIGRATED to testing (Debian testing watch)
  • [2022-02-16] Accepted nvidia-graphics-drivers-legacy-390xx 390.147-3 (source) into unstable (Andreas Beckmann)
  • 1
  • 2
bugs [bug history graph]
  • all: 11
  • RC: 9
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing