First published: Wed Jul 21 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it improperly validates the length field in a request from a guest. This flaw allows a malicious guest to send a length field that is inconsistent with the actual length of the input, which may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA vGPU Software | >=8.0<8.8 | |
NVIDIA vGPU Software | >=11.0<11.5 | |
NVIDIA vGPU Software | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1097 is classified as a high-severity vulnerability due to its potential to allow unauthorized information access.
To fix CVE-2021-1097, you should update the NVIDIA vGPU software to a version that contains the necessary security patches.
CVE-2021-1097 is a security vulnerability in the Virtual GPU Manager related to improper validation of a request length field.
Users of NVIDIA vGPU software versions between 8.0 and 8.8, 11.0 and 11.5, or 12.0 and 12.3 are affected by CVE-2021-1097.
CVE-2021-1097 could allow a malicious guest to exploit the length validation flaw, potentially leading to information disclosure.