First published: Fri Jan 08 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input data size is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=8.0<8.6 | |
NVIDIA Virtual GPU Manager | >=11.0<11.3 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Nutanix Ahv | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NVIDIA vGPU software vulnerability is CVE-2021-1058.
The affected software for this vulnerability is NVIDIA Virtual GPU Manager version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
The severity of CVE-2021-1058 is high with a severity value of 7.1.
This vulnerability can be exploited by tampering with data or causing denial of service due to the lack of input data size validation.
To fix CVE-2021-1058, update to NVIDIA Virtual GPU Manager version 8.6 or version 11.3.