First published: Thu Apr 29 2021(Updated: )
NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), which could allow an attacker to retrieve information that could lead to a Address Space Layout Randomization (ASLR) bypass. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU Manager | >=8.0<8.7 | |
Citrix Hypervisor | ||
Nutanix Ahv | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
NVIDIA Virtual GPU Manager | >=11.0<11.4 | |
NVIDIA Virtual GPU Manager | >=12.0<12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1087 is a vulnerability in the NVIDIA vGPU driver's Virtual GPU Manager (vGPU plugin) that could allow an attacker to bypass Address Space Layout Randomization (ASLR).
NVIDIA Virtual GPU Manager versions 8.x to 12.0 are affected by CVE-2021-1087.
CVE-2021-1087 has a severity rating of 5.5 (medium).
An attacker can exploit CVE-2021-1087 to retrieve information that could lead to an ASLR bypass.
You can find more information about CVE-2021-1087 on the NVIDIA customer help website.