<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nvidia-open-driver-G06-signed</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20327-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-15T15:59:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-15T15:59:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-15T15:59:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nvidia-open-driver-G06-signed</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nvidia-open-driver-G06-signed fixes the following issues:

Update CUDA variant to 570.133.20

Update non-CUDA variant to 570.144 (bsc#1241231)

Update non-CUDA variant to 570.133.07 (bsc#1239653) 

- removed obsolete kernel-firmware-nvidia-gspx-G06-cuda; firmware
  has moved to nvidia-common-G06 and
  kernel-firmware-nvidia-gspx-G06 is no longer available either
  (bsc#1239139)

Update CUDA variant to 570.124.06

Update non-CUDA variant to 570.124.04 (bsc#1237585) 

Update non-CUDA variant to 570.124.02 (bsc#1237585)

In the module install path revert the order of the 'updates'
subdirectory and the package name &amp; version. This satisfies
the kmp dependency checker (bsc#1237308).

update non-CUDA variant to 570.86.16 (bsc#1236658)

Update to 565.77

- non-CUDA variant:
  * get rid of modprobe.d and dracut.d files and udev magic; 
    instead require nvidia-common-G06 
  * Supplements: switch to really supported devices; not only the
    initially supported ones without graphical output

update non-CUDA and CUDA variant to 570.86.15

- preamble: let -cuda KMP conflict with no-cuda variants &lt; 550.135
  (bsc#1236191)

Update to 550.144.03 (bsc#1235461, bsc#1235871)

* fixes CVE-2024-0131, CVE-2024-0147, CVE-2024-0149, CVE-2024-0150, CVE-2024-53869
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-kernel-21</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      <Description>Link for SUSE-SU-2025:20327-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-May/020910.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20327-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235461</URL>
      <Description>SUSE Bug 1235461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235871</URL>
      <Description>SUSE Bug 1235871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236191</URL>
      <Description>SUSE Bug 1236191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236658</URL>
      <Description>SUSE Bug 1236658</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236746</URL>
      <Description>SUSE Bug 1236746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237308</URL>
      <Description>SUSE Bug 1237308</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237585</URL>
      <Description>SUSE Bug 1237585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239139</URL>
      <Description>SUSE Bug 1239139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239653</URL>
      <Description>SUSE Bug 1239653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241231</URL>
      <Description>SUSE Bug 1241231</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0131/</URL>
      <Description>SUSE CVE CVE-2024-0131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0147/</URL>
      <Description>SUSE CVE CVE-2024-0147 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0149/</URL>
      <Description>SUSE CVE CVE-2024-0149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0150/</URL>
      <Description>SUSE CVE CVE-2024-0150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53869/</URL>
      <Description>SUSE CVE CVE-2024-53869 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1">
      <FullProductName ProductID="nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1">nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1">
      <FullProductName ProductID="nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1">nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1">nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1">nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU kernel driver for Windows and Linux contains a vulnerability where a potential user-mode attacker could read   a buffer with an incorrect length. A successful exploit of this vulnerability might lead to denial of service.</Note>
    </Notes>
    <CVE>CVE-2024-0131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0131.html</URL>
        <Description>CVE-2024-0131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235461</URL>
        <Description>SUSE Bug 1235461</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU display driver for Windows and Linux contains a vulnerability where referencing memory after it has been freed can lead to denial of service or data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0147.html</URL>
        <Description>CVE-2024-0147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235461</URL>
        <Description>SUSE Bug 1235461</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.</Note>
    </Notes>
    <CVE>CVE-2024-0149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0149.html</URL>
        <Description>CVE-2024-0149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235461</URL>
        <Description>SUSE Bug 1235461</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering.</Note>
    </Notes>
    <CVE>CVE-2024-0150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0150.html</URL>
        <Description>CVE-2024-0150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235461</URL>
        <Description>SUSE Bug 1235461</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NVIDIA Unified Memory driver for Linux contains a vulnerability where an attacker could leak uninitialized memory. A successful exploit of this vulnerability might lead to information disclosure.</Note>
    </Notes>
    <CVE>CVE-2024-53869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-cuda-kmp-default-570.133.20_k6.4.0_28-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:nvidia-open-driver-G06-signed-kmp-default-570.144_k6.4.0_28-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520327-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53869.html</URL>
        <Description>CVE-2024-53869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235461</URL>
        <Description>SUSE Bug 1235461</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
