First published: Fri Oct 02 2020(Updated: )
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=8.0<8.5 | |
NVIDIA Virtual GPU Manager | >=10.0<10.4 | |
NVIDIA Virtual GPU Manager | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5987 is a vulnerability in NVIDIA Virtual GPU Manager that allows guest-supplied parameters to remain writable by the guest after validation.
The severity of CVE-2020-5987 is high.
CVE-2020-5987 affects NVIDIA Virtual GPU Manager by allowing guests to pass invalid parameters to plugin handlers, potentially leading to denial of service or escalation of privileges.
Versions 8.0 to 8.5, 10.0 to 10.4, and 11.0 of NVIDIA Virtual GPU Manager are affected by CVE-2020-5987.
To fix CVE-2020-5987, NVIDIA recommends updating to a version of Virtual GPU Manager that is not affected by the vulnerability.