NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2022-12-30 23:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-42261
Mitre link : CVE-2022-42261
CVE.ORG link : CVE-2022-42261
JSON object : View
Products Affected
nvidia
- rtx
- gpu_display_driver
- quadro
- geforce
- virtual_gpu
- cloud_gaming
- tesla
- nvs
citrix
- hypervisor
vmware
- vsphere
redhat
- enterprise_linux_kernel-based_virtual_machine
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')