NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2022-12-30 23:15
Updated : 2023-10-19 01:33
NVD link : CVE-2022-42261
Mitre link : CVE-2022-42261
CVE.ORG link : CVE-2022-42261
JSON object : View
Products Affected
citrix
- hypervisor
nvidia
- gpu_display_driver
- rtx
- virtual_gpu
- quadro
- geforce
- tesla
- cloud_gaming
- nvs
vmware
- vsphere
linux
- linux_kernel
redhat
- enterprise_linux_kernel-based_virtual_machine
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')