NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
19 Oct 2023, 01:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-12-30 23:15
Updated : 2023-10-19 01:33
NVD link : CVE-2022-42261
Mitre link : CVE-2022-42261
JSON object : View
Products Affected
citrix
- hypervisor
nvidia
- geforce
- nvs
- virtual_gpu
- quadro
- cloud_gaming
- gpu_display_driver
- rtx
- tesla
redhat
- enterprise_linux_kernel-based_virtual_machine
vmware
- vsphere
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')