NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5415 | Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-30 23:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-42261
Mitre link : CVE-2022-42261
CVE.ORG link : CVE-2022-42261
JSON object : View
Products Affected
citrix
- hypervisor
vmware
- vsphere
linux
- linux_kernel
nvidia
- rtx
- virtual_gpu
- nvs
- gpu_display_driver
- geforce
- quadro
- tesla
- cloud_gaming
redhat
- enterprise_linux_kernel-based_virtual_machine
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')