Debian Package Tracker
Register | Log in
Subscribe

nvidia-graphics-drivers-tesla-418

Choose email to subscribe with

general
  • source: nvidia-graphics-drivers-tesla-418 (non-free)
  • version: 418.226.00-18
  • maintainer: Debian NVIDIA Maintainers (archive) (DMD)
  • uploaders: Andreas Beckmann [DMD] – Luca Boccassi [DMD]
  • arch: amd64 i386 ppc64el
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 418.226.00-6~deb11u2
  • old-p-u: 418.226.00-6~deb11u2
  • unstable: 418.226.00-18
versioned links
  • 418.226.00-6~deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 418.226.00-18: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libegl-nvidia-tesla-418-0
  • libegl1-nvidia-tesla-418
  • libgl1-nvidia-tesla-418-glvnd-glx
  • libgl1-nvidia-tesla-418-glx
  • libgles-nvidia-tesla-418-1
  • libgles-nvidia-tesla-418-2
  • libglx-nvidia-tesla-418-0
  • libnvidia-tesla-418-cbl
  • libnvidia-tesla-418-cfg1
  • libnvidia-tesla-418-compiler
  • libnvidia-tesla-418-cuda1
  • libnvidia-tesla-418-eglcore
  • libnvidia-tesla-418-encode1
  • libnvidia-tesla-418-fatbinaryloader
  • libnvidia-tesla-418-fbc1
  • libnvidia-tesla-418-glcore
  • libnvidia-tesla-418-glvkspirv
  • libnvidia-tesla-418-ifr1
  • libnvidia-tesla-418-ml1
  • libnvidia-tesla-418-nvcuvid1
  • libnvidia-tesla-418-nvoptix1
  • libnvidia-tesla-418-opticalflow1
  • libnvidia-tesla-418-ptxjitcompiler1
  • libnvidia-tesla-418-rtcore
  • nvidia-nonglvnd-vulkan-common
  • nvidia-tesla-418-alternative
  • nvidia-tesla-418-driver (1 bugs: 1, 0, 0, 0)
  • nvidia-tesla-418-driver-bin
  • nvidia-tesla-418-driver-libs
  • nvidia-tesla-418-driver-libs-nonglvnd
  • nvidia-tesla-418-egl-icd
  • nvidia-tesla-418-kernel-dkms
  • nvidia-tesla-418-kernel-source
  • nvidia-tesla-418-kernel-support
  • nvidia-tesla-418-nonglvnd-vulkan-icd
  • nvidia-tesla-418-opencl-icd
  • nvidia-tesla-418-smi
  • nvidia-tesla-418-vdpau-driver
  • nvidia-tesla-418-vulkan-icd
  • xserver-xorg-video-nvidia-tesla-418 (1 bugs: 1, 0, 0, 0)
action needed
50 security issues in sid high

There are 50 open security issues in sid.

50 important issues:
  • CVE-2023-0180: NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
  • CVE-2024-0074: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
  • CVE-2024-0078: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service.
  • CVE-2024-0090: NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0092: NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
  • CVE-2024-0126: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2024-0131: NVIDIA GPU kernel driver for Windows and Linux contains a vulnerability where a potential user-mode attacker could read  a buffer with an incorrect length. A successful exploit of this vulnerability might lead to denial of service.
  • CVE-2024-0147: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where referencing memory after it has been freed can lead to denial of service or data tampering.
  • CVE-2024-0149: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.
  • CVE-2024-0150: NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering.
  • CVE-2022-28181: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
  • CVE-2022-28185: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering.
  • CVE-2022-28192: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges.
  • CVE-2022-31607: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure.
  • CVE-2022-31608: NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2022-31615: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34665: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34666: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34670: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure.
  • CVE-2022-34674: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak.
  • CVE-2022-34675: NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34677: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering.
  • CVE-2022-34679: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34680: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service.
  • CVE-2022-34682: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-42254: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42255: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42256: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42257: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service.
  • CVE-2022-42258: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42259: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service.
  • CVE-2022-42260: NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
  • CVE-2022-42261: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42262: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42263: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure.
  • CVE-2022-42264: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service.
  • CVE-2023-25515: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
  • CVE-2023-31022: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
  • CVE-2025-23244: NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an unprivileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Created: 2022-07-04 Last update: 2025-05-02 05:00
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 20-day delay is over. Check why.
Created: 2025-04-03 Last update: 2025-05-21 03:32
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-02-05 Last update: 2023-02-05 04:30
testing migrations
  • excuses:
    • Migration status for nvidia-graphics-drivers-tesla-418 (- to 418.226.00-18): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ xserver-xorg-video-nvidia-tesla-418/amd64 has unsatisfiable dependency
    • ∙ ∙ xserver-xorg-video-nvidia-tesla-418/ppc64el has unsatisfiable dependency
    • ∙ ∙ Updating nvidia-graphics-drivers-tesla-418 would introduce bugs in testing: #1005930, #1006718, #1011143, #1016617, #1025282, #1033777, #1039681, #1055139, #1064986, #1072795, #1081648, #1085971, #1093911, #1104071
    • ∙ ∙ blocked by freeze: is not in testing
    • ∙ ∙ autopkgtest for nvidia-graphics-drivers-tesla-418/418.226.00-18: i386: No tests, superficial or marked flaky ♻
    • Additional info:
    • ∙ ∙ Cannot be tested by piuparts (not a blocker) - (no link yet)
    • ∙ ∙ uninstallable on arch amd64, not running autopkgtest there
    • ∙ ∙ uninstallable on arch ppc64el, not running autopkgtest there
    • ∙ ∙ 53 days old (needed 20 days)
    • Not considered
news
[rss feed]
  • [2025-03-29] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-18 (source) into unstable (Andreas Beckmann)
  • [2025-01-28] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-17 (source) into unstable (Andreas Beckmann)
  • [2024-08-10] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6~deb11u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2024-08-04] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-16 (source) into unstable (Andreas Beckmann)
  • [2024-07-27] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-15 (source) into unstable (Andreas Beckmann)
  • [2024-05-20] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-14 (source) into unstable (Andreas Beckmann)
  • [2023-11-13] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-13 (source) into unstable (Andreas Beckmann)
  • [2023-08-14] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-12 (source) into unstable (Andreas Beckmann)
  • [2023-06-15] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-11 (source) into unstable (Andreas Beckmann)
  • [2023-04-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-10 (source i386) into unstable (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-12-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-9 (source) into unstable (Andreas Beckmann)
  • [2022-10-20] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-8 (source) into unstable (Andreas Beckmann)
  • [2022-08-06] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-7 (source) into unstable (Andreas Beckmann)
  • [2022-07-06] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6~deb11u1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-07-02] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-06-23] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6 (source) into unstable (Andreas Beckmann)
  • [2022-05-22] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-5 (source) into unstable (Andreas Beckmann)
  • [2022-04-14] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-4 (source) into unstable (Andreas Beckmann)
  • [2022-04-13] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-3 (source) into unstable (Andreas Beckmann)
  • [2022-02-25] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-2 (source) into unstable (Andreas Beckmann)
  • [2022-02-23] nvidia-graphics-drivers-tesla-418 REMOVED from testing (Debian testing watch)
  • [2021-11-10] nvidia-graphics-drivers-tesla-418 418.226.00-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-1 (source) into unstable (Andreas Beckmann)
  • [2021-09-27] nvidia-graphics-drivers-tesla-418 418.211.00-2 MIGRATED to testing (Debian testing watch)
  • [2021-09-20] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-2 (source) into unstable (Andreas Beckmann)
  • [2021-08-02] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2021-08-01] nvidia-graphics-drivers-tesla-418 418.211.00-1 MIGRATED to testing (Debian testing watch)
  • [2021-07-22] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-1 (source) into unstable (Andreas Beckmann)
  • [2021-05-04] Accepted nvidia-graphics-drivers-tesla-418 418.197.02-1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2021-04-26] nvidia-graphics-drivers-tesla-418 418.197.02-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 15
  • RC: 14
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (87, -)
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing