First published: Wed Jul 21 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel mode driver (nvidia.ko), in which a pointer to a user-space buffer is not validated before it is dereferenced, which may lead to denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA vGPU Software | >=8.0<8.8 | |
NVIDIA vGPU Software | >=11.0<11.5 | |
NVIDIA vGPU Software | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1100 has been assigned a medium severity rating due to the potential for denial of service.
To fix CVE-2021-1100, update the NVIDIA vGPU software to version 12.3 or later for 12.x versions, or to version 11.5 or later for 11.x versions.
CVE-2021-1100 affects NVIDIA vGPU software versions 11.x prior to 11.5 and 12.x prior to 12.3.
Exploiting CVE-2021-1100 may lead to a denial of service by dereferencing an unvalidated pointer.
There are currently no publicly documented workarounds for CVE-2021-1100, so an update is recommended.