First published: Thu Apr 29 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior 8.7).
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=8.0<8.7 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Nutanix Ahv | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
NVIDIA Virtual GPU Manager | >=11.0<11.4 | |
NVIDIA Virtual GPU Manager | >=12.0<12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1081.
The severity of CVE-2021-1081 is high (7.8).
The NVIDIA vGPU software versions 12.x (prior to 12.2) and 11.0 to 11.4 are affected.
The potential consequences of this vulnerability include information disclosure, tampering of data, and denial of service.
You can find more information about CVE-2021-1081 at the following link: [NVIDIA Security Bulletin](https://nvidia.custhelp.com/app/answers/detail/a_id/5172).