First published: Thu Apr 29 2021(Updated: )
NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=11.0<11.4 | |
NVIDIA Virtual GPU Manager | >=12.0<12.2 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1084 is a vulnerability in the NVIDIA vGPU driver that could result in information disclosure, data tampering, or denial of service.
The vGPU version 12.x (prior to 12.2) and version 1 of the NVIDIA Virtual GPU Manager are affected.
CVE-2021-1084 has a severity rating of 7.8, which is considered high.
CVE-2021-1084 can be exploited by providing malicious input that is not properly validated, leading to potential information disclosure, data tampering, or denial of service.
To mitigate CVE-2021-1084, it is recommended to update to vGPU version 12.2 or later and version 2 of the NVIDIA Virtual GPU Manager.