FERRAMENTAS LINUX: Critical NVIDIA Open Driver Security Update: Patch 5 Vulnerabilities Now (CVE-2024-0131 to CVE-2024-53869)

segunda-feira, 30 de junho de 2025

Critical NVIDIA Open Driver Security Update: Patch 5 Vulnerabilities Now (CVE-2024-0131 to CVE-2024-53869)

 

SUSE


Urgent NVIDIA open driver update fixes 5 critical vulnerabilities (CVE-2024-0131, CVE-2024-0147, CVE-2024-0149, CVE-2024-0150, CVE-2024-53869) affecting SUSE Linux, openSUSE Leap, and enterprise systems. Learn patch instructions, CVSS scores, and mitigation steps.


Why This Security Update Matters

NVIDIA’s open-source GPU drivers are widely used in enterprise Linux environments, making this "important"-rated update critical for system administrators and DevOps teams. The patch addresses five vulnerabilities, including:

  • CVE-2024-0150 (CVSS 7.1) – High-severity flaw allowing local privilege escalation.

Affected Systems Include:

SUSE Linux Enterprise Server 15 SP4

openSUSE Leap 15.4

SUSE Manager Server/Proxy 4.3

Cloud/HPC deployments


Patch Instructions (Step-by-Step)

1. Recommended Update Methods

  • YaST Online Update (GUI)

  • Zypper Patch (CLI):

    bash
    zypper in -t patch SUSE-2025-2165=1  # openSUSE Leap 15.4
  • Product-Specific Commands (see full list below).

2. Verify Installation

Check the driver version post-update:

bash
modinfo nvidia-open-driver-G06-signed | grep version

Expected output: 550.144.03 or higher.


Vulnerability Breakdown (CVSS Scores)

CVE IDSeverity (SUSE/NVD)ImpactAffected Components
CVE-2024-01507.1 (High)Privilege escalationKernel module
CVE-2024-538695.5 (Medium)Memory corruptionCUDA drivers
CVE-2024-01315.5/4.4 (Medium)Denial of serviceGPU firmware

Key Takeaway: The CVE-2024-0150 flaw is the most severe, requiring immediate patching in multi-user environments.


Affected Packages & Systems

Enterprise Systems

  • SUSE Linux Enterprise Micro 5.3/5.4

  • SUSE Manager Retail Branch Server

  • Public Cloud Module 15-SP4

Package List Highlights

  • nvidia-open-driver-G06-signed-kmp-default (x86_64/aarch64)

  • nvidia-open-driver-G06-signed-cuda-devel (CUDA toolkit)

  • Debug symbols for troubleshooting (-debuginfo packages).

Full package list: [See original bulletin for details].


Mitigation & Best Practices

  1. Priority Patching: Apply updates within 24 hours for exposed systems.

  2. Monitor Logs: Check journalctl for GPU-related errors post-update.

  3. CUDA Workloads: Test performance-critical applications after patching.


FAQ Section

Q: Does this affect NVIDIA proprietary drivers?

A: No—this impacts open-source drivers (nvidia-open-driver-G06). Proprietary drivers use separate updates.

Q: Can vulnerabilities be exploited remotely?

A: All CVEs require local access, but shared systems (HPC/cloud) are at higher risk.

Q: How do I verify my system is patched?

A: Run zypper patches | grep SUSE-2025-2165.


Nenhum comentário:

Postar um comentário