Debian Package Tracker
Register | Log in
Subscribe

nvidia-graphics-drivers-tesla-418

Choose email to subscribe with

general
  • source: nvidia-graphics-drivers-tesla-418 (non-free)
  • version: 418.226.00-12
  • maintainer: Debian NVIDIA Maintainers (archive) (DMD)
  • uploaders: Andreas Beckmann [DMD] – Luca Boccassi [DMD]
  • arch: amd64 i386 ppc64el
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-bpo: 418.226.00-6~deb11u1~bpo10+1
  • oldstable: 418.226.00-6~deb11u1
  • unstable: 418.226.00-12
versioned links
  • 418.226.00-6~deb11u1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 418.226.00-6~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 418.226.00-12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libegl-nvidia-tesla-418-0
  • libegl1-nvidia-tesla-418
  • libgl1-nvidia-tesla-418-glvnd-glx
  • libgl1-nvidia-tesla-418-glx
  • libgles-nvidia-tesla-418-1
  • libgles-nvidia-tesla-418-2
  • libglx-nvidia-tesla-418-0
  • libnvidia-tesla-418-cbl
  • libnvidia-tesla-418-cfg1
  • libnvidia-tesla-418-compiler
  • libnvidia-tesla-418-cuda1
  • libnvidia-tesla-418-eglcore
  • libnvidia-tesla-418-encode1
  • libnvidia-tesla-418-fatbinaryloader
  • libnvidia-tesla-418-fbc1
  • libnvidia-tesla-418-glcore
  • libnvidia-tesla-418-glvkspirv
  • libnvidia-tesla-418-ifr1
  • libnvidia-tesla-418-ml1
  • libnvidia-tesla-418-nvcuvid1
  • libnvidia-tesla-418-nvoptix1
  • libnvidia-tesla-418-opticalflow1
  • libnvidia-tesla-418-ptxjitcompiler1
  • libnvidia-tesla-418-rtcore
  • nvidia-nonglvnd-vulkan-common
  • nvidia-tesla-418-alternative
  • nvidia-tesla-418-driver
  • nvidia-tesla-418-driver-bin
  • nvidia-tesla-418-driver-libs
  • nvidia-tesla-418-driver-libs-nonglvnd
  • nvidia-tesla-418-egl-icd
  • nvidia-tesla-418-kernel-dkms
  • nvidia-tesla-418-kernel-source
  • nvidia-tesla-418-kernel-support
  • nvidia-tesla-418-nonglvnd-vulkan-icd
  • nvidia-tesla-418-opencl-icd
  • nvidia-tesla-418-smi
  • nvidia-tesla-418-vdpau-driver
  • nvidia-tesla-418-vulkan-icd
  • xserver-xorg-video-nvidia-tesla-418 (1 bugs: 1, 0, 0, 0)
action needed
39 security issues in sid high

There are 39 open security issues in sid.

39 important issues:
  • CVE-2023-0180: NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-0184: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
  • CVE-2022-28181: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
  • CVE-2022-28185: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering.
  • CVE-2022-28192: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges.
  • CVE-2022-31607: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure.
  • CVE-2022-31608: NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2022-31615: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34665: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34666: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34670: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure.
  • CVE-2022-34674: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak.
  • CVE-2022-34675: NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34677: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering.
  • CVE-2022-34679: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34680: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service.
  • CVE-2022-34682: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-42254: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42255: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42256: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42257: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service.
  • CVE-2022-42258: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42259: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service.
  • CVE-2022-42260: NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
  • CVE-2022-42261: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42262: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42263: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure.
  • CVE-2022-42264: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service.
  • CVE-2023-25515: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
Created: 2022-07-04 Last update: 2023-08-17 09:26
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2023-08-19 Last update: 2023-09-25 13:37
37 low-priority security issues in bullseye low

There are 37 open security issues in bullseye.

34 issues left for the package maintainer to handle:
  • CVE-2023-0180: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in a kernel mode layer handler, which may lead to denial of service or information disclosure.
  • CVE-2023-0184: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0185: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure.
  • CVE-2023-0188: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
  • CVE-2023-0189: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2023-0190: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
  • CVE-2023-0191: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
  • CVE-2023-0194: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer driver, where an invalid display configuration may lead to denial of service.
  • CVE-2023-0195: (needs triaging) NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
  • CVE-2023-0198: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
  • CVE-2023-0199: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
  • CVE-2022-31607: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure.
  • CVE-2022-31608: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
  • CVE-2022-31615: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34665: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34666: (needs triaging) NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34670: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure.
  • CVE-2022-34674: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak.
  • CVE-2022-34675: (needs triaging) NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34677: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering.
  • CVE-2022-34679: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-34680: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service.
  • CVE-2022-34682: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service.
  • CVE-2022-42254: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42255: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42256: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering.
  • CVE-2022-42257: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service.
  • CVE-2022-42258: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure.
  • CVE-2022-42259: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service.
  • CVE-2022-42260: (needs triaging) NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
  • CVE-2022-42261: (needs triaging) NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42262: (needs triaging) NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
  • CVE-2022-42263: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure.
  • CVE-2022-42264: (needs triaging) NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service.

You can find information about how to handle these issues in the security team's documentation.

3 ignored issues:
  • CVE-2022-28181: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
  • CVE-2022-28185: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering.
  • CVE-2022-28192: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges.
2 issues that should be fixed with the next stable update:
  • CVE-2023-25515: NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
  • CVE-2023-25516: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause an integer overflow, which may lead to information disclosure and denial of service.
Created: 2022-07-09 Last update: 2023-08-17 09:26
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-02-05 Last update: 2023-02-05 04:30
testing migrations
  • excuses:
    • Migration status for nvidia-graphics-drivers-tesla-418 (- to 418.226.00-12): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ xserver-xorg-video-nvidia-tesla-418/amd64 has unsatisfiable dependency
    • ∙ ∙ xserver-xorg-video-nvidia-tesla-418/ppc64el has unsatisfiable dependency
    • ∙ ∙ Updating nvidia-graphics-drivers-tesla-418 would introduce bugs in testing: #1005930, #1006718, #1011143, #1016617, #1025282, #1033777, #1039681
    • ∙ ∙ autopkgtest for nvidia-graphics-drivers-tesla-418/418.226.00-12: i386: No test results ♻
    • Additional info:
    • ∙ ∙ Cannot be tested by piuparts (not a blocker) - (no link yet)
    • ∙ ∙ uninstallable on arch amd64, not running autopkgtest there
    • ∙ ∙ uninstallable on arch ppc64el, not running autopkgtest there
    • ∙ ∙ 42 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2023-08-14] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-12 (source) into unstable (Andreas Beckmann)
  • [2023-06-15] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-11 (source) into unstable (Andreas Beckmann)
  • [2023-04-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-10 (source i386) into unstable (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-12-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-9 (source) into unstable (Andreas Beckmann)
  • [2022-10-20] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-8 (source) into unstable (Andreas Beckmann)
  • [2022-08-06] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-7 (source) into unstable (Andreas Beckmann)
  • [2022-07-06] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6~deb11u1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-07-02] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2022-06-23] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-6 (source) into unstable (Andreas Beckmann)
  • [2022-05-22] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-5 (source) into unstable (Andreas Beckmann)
  • [2022-04-14] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-4 (source) into unstable (Andreas Beckmann)
  • [2022-04-13] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-3 (source) into unstable (Andreas Beckmann)
  • [2022-02-25] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-2 (source) into unstable (Andreas Beckmann)
  • [2022-02-23] nvidia-graphics-drivers-tesla-418 REMOVED from testing (Debian testing watch)
  • [2021-11-10] nvidia-graphics-drivers-tesla-418 418.226.00-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-05] Accepted nvidia-graphics-drivers-tesla-418 418.226.00-1 (source) into unstable (Andreas Beckmann)
  • [2021-09-27] nvidia-graphics-drivers-tesla-418 418.211.00-2 MIGRATED to testing (Debian testing watch)
  • [2021-09-20] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-2 (source) into unstable (Andreas Beckmann)
  • [2021-08-02] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2021-08-01] nvidia-graphics-drivers-tesla-418 418.211.00-1 MIGRATED to testing (Debian testing watch)
  • [2021-07-22] Accepted nvidia-graphics-drivers-tesla-418 418.211.00-1 (source) into unstable (Andreas Beckmann)
  • [2021-05-04] Accepted nvidia-graphics-drivers-tesla-418 418.197.02-1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Andreas Beckmann)
  • [2021-04-26] nvidia-graphics-drivers-tesla-418 418.197.02-1 MIGRATED to testing (Debian testing watch)
  • [2021-04-20] Accepted nvidia-graphics-drivers-tesla-418 418.197.02-1 (source) into unstable (Andreas Beckmann)
  • [2021-04-14] nvidia-graphics-drivers-tesla-418 418.181.07-2 MIGRATED to testing (Debian testing watch)
  • [2021-03-12] Accepted nvidia-graphics-drivers-tesla-418 418.181.07-2 (source) into unstable (Andreas Beckmann)
  • [2021-02-01] Accepted nvidia-graphics-drivers-tesla-418 418.181.07-1~bpo10+1 (source) into buster-backports (Andreas Beckmann)
  • [2021-01-27] nvidia-graphics-drivers-tesla-418 418.181.07-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-22] Accepted nvidia-graphics-drivers-tesla-418 418.181.07-1 (source) into unstable (Andreas Beckmann)
  • [2020-12-22] nvidia-graphics-drivers-tesla-418 418.165.02-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 8
  • RC: 7
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (86, -)
  • debci

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing