First published: Fri Oct 29 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can double-free a pointer, which may lead to denial of service. This flaw may result in a write-what-where condition, allowing an attacker to execute arbitrary code impacting integrity and availability.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Virtual GPU Graphics Driver | >=8.0<8.9 | |
Nvidia Virtual GPU Graphics Driver | >=11.0<11.6 | |
Nvidia Virtual GPU Graphics Driver | >=12.0<12.4 | |
Nvidia Virtual GPU Graphics Driver | >=13.0<13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1119 has a high severity rating as it can lead to denial of service and arbitrary code execution.
To fix CVE-2021-1119, update your NVIDIA vGPU software to a version that is not affected, specifically versions 8.10 or later, 11.7 or later, 12.5 or later, or 13.2 or later.
CVE-2021-1119 can compromise system integrity and availability, potentially allowing unauthorized code execution.
CVE-2021-1119 affects NVIDIA vGPU software versions 8.0 to 8.9, 11.0 to 11.6, 12.0 to 12.4, and 13.0 to 13.1.
Yes, CVE-2021-1119 can potentially be exploited remotely, allowing attackers to execute arbitrary code.