<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nvidia-open-driver-G06-signed</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20108-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-03T09:19:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-03T09:19:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-03T09:19:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nvidia-open-driver-G06-signed</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nvidia-open-driver-G06-signed fixes the following issues:

- Make sure the correct FW package is installed on non-CUDA.
- only obsolete 555 CUDA driver/firmware packages
- For CUDA: update version to 565.57.01

- Add 'dummy' firmware package on SLE to work around update
  issues. On SLE, the firmware is installed directly from
  an NVIDIA-hosted repo.

- Improve handling of conflicts between different flavors (gfx vs. CUDA) (bsc#1233332).

- Update to 550.135 (bsc#1233673)

- Update to 550.127.05 (bsc#1232057)
  * Fixed a bug which could cause applications using GBM to crash
    when running with nvidia-drm.modeset=0.

- cuda-flavor

  provide also nvidia-open-driver-G06-kmp-$flavor = %version to
  workaround broken cuda-drivers

- For CUDA update version to 560.35.03 

- nv-prefer-signed-open-driver:

  * added specicic versions of cuda-drivers/cuda-drivers-xxx as
    preconditions for requiring specific version of
    nvidia-compute-G06 

- nv-prefer-signed-open-driver:

  * no longer require a specific version of
    nvidia-open-driver-G06-signed-cuda-kmp, so it can select the
    correct open driver KMP matching the cuda-runtime version

- cuda-flavor:

  * added nvidia-compute-G06 = %version to preconditions for
    requiring kernel-firmware-nvidia-gspx-G06, since
    nvidia-compute-utils-G06 does not have a version-specific
    requires on nvidia-compute-G06

- cuda-flavor: 

  * require kernel-firmware-nvidia-gspx-G06 instead of 
    kernel-firmware-nvidia-gspx-G06-cuda (which provides also
    kernel-firmware-nvidia-gspx-G06)
  * trigger removal of driver modules also on
    kernel-firmware-nvidia-gspx-G06

- no longer hard-require kernel firmware package, but install it
  automatically once nvidia-compute-utils-G06 gets installed

- trigger removal of driver modules with non-existing or wrong
  firmware when (new) firmware gets installed

- Update to 550.120 (bsc#1230779)

  * Fixed a bug that could cause kernel crashes upon attempting
    KMS operations through DRM when nvidia_drm was loaded with
    modeset=0.

- CUDA build: removed entries from pci_ids-555.42.06 since this is
  doing more harm than benefit (bsc#1230368)

- For CUDA (preamble file):
  * added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version
    which is needed for 'zypper install &lt;package&gt; = &lt;version&gt;'
  * added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor = %version
    useful for containers

- reverted CUDA update version to 560.x.y due to changes in CUDA
  repository with CUDA 12.6/560.x.y drivers

- For CUDA update version to 560.35.03 

- Update to 550.107.02 (bsc#1229716)

- For CUDA update version to 560.28.03

- Update to 550.100 (bsc#1227575)

  * Fixed a bug that caused OpenGL triple buffering to behave like
    double buffering.

- To avoid issues with missing dependencies when no CUDA repo
  is present make the dependecy to nvidia-compute-G06 conditional.
- CUDA is not available for Tumbleweed, exclude the build of the
  cuda flavor.

- preamble: let the -cuda flavor KMP require the -cuda flavor
  firmware

- Add a second flavor for building the kernel module versions
  used by CUDA. The kmp targetting CUDA contains '-cuda' in
  its name to track its versions separately from the graphics
  kmp. (bsc#1227417)

- Provide the meta package nv-prefer-signed-open-driver to
  make sure the latest available SUSE-build open driver is
  installed - independent of the latest available open driver
  version in he CUDA repository.
  Rationale:
  The package cuda-runtime provides the link between CUDA and
  the kernel driver version through a
  Requires: cuda-drivers &gt;= %version
  This implies that a CUDA version will run withany kernel driver
  version equal or higher than a base version.
  nvidia-compute-G06 provides the glue layer between CUDA and
  a specific version of he kernel driver both by providing
  a set of base libraries and by requiring a specific kernel
  version. 'cuda-drivers' (provided by nvidia-compute-utils-G06)
  requires an unversioned nvidia-compute-G06. With this, the
  resolver will install the latest available and applicable
  nvidia-compute-G06.
  nv-prefer-signed-open-driver then represents the latest available
  open driver version and restricts the nvidia-compute-G06 version
  to it. (bsc#1227419)

- Security Update 550.90.07 (bsc#1223356) [CVE-2024-0090,
  CVE-2024-0091, CVE-2024-0092]

- Update to 550.78 (bsc#1223454)
- Update to 550.76 (bsc#1222972)
- Update to 550.67

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-174</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520108-1/</URL>
      <Description>Link for SUSE-SU-2025:20108-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021213.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20108-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222972</URL>
      <Description>SUSE Bug 1222972</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223356</URL>
      <Description>SUSE Bug 1223356</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223454</URL>
      <Description>SUSE Bug 1223454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227417</URL>
      <Description>SUSE Bug 1227417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227419</URL>
      <Description>SUSE Bug 1227419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227575</URL>
      <Description>SUSE Bug 1227575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229716</URL>
      <Description>SUSE Bug 1229716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230368</URL>
      <Description>SUSE Bug 1230368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230779</URL>
      <Description>SUSE Bug 1230779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232057</URL>
      <Description>SUSE Bug 1232057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233332</URL>
      <Description>SUSE Bug 1233332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233673</URL>
      <Description>SUSE Bug 1233673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0090/</URL>
      <Description>SUSE CVE CVE-2024-0090 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0091/</URL>
      <Description>SUSE CVE CVE-2024-0091 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0092/</URL>
      <Description>SUSE CVE CVE-2024-0092 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1">
      <FullProductName ProductID="nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1">nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1">
      <FullProductName ProductID="nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1">nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1">nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1">nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0090.html</URL>
        <Description>CVE-2024-0090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223356</URL>
        <Description>SUSE Bug 1223356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0091.html</URL>
        <Description>CVE-2024-0091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223356</URL>
        <Description>SUSE Bug 1223356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.</Note>
    </Notes>
    <CVE>CVE-2024-0092</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_20-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0092.html</URL>
        <Description>CVE-2024-0092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223356</URL>
        <Description>SUSE Bug 1223356</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
