First published: Fri Dec 30 2022(Updated: )
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU | <11.11 | |
NVIDIA Virtual GPU | >=12.0<13.6 | |
NVIDIA Virtual GPU | >=14.0<14.4 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
Nvidia Cloud Gaming | <525.60.11 | |
Nvidia Cloud Gaming | <525.60.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NVIDIA GPU Display Driver for Linux vulnerability is CVE-2022-42255.
The affected software for this vulnerability includes Nvidia Virtual Gpu versions up to exclusive 11.11, versions between inclusive exclusive 12.0 and 13.6, and versions between inclusive exclusive 14.0 and 14.4; Citrix Hypervisor, Linux Linux kernel, Redhat Enterprise Linux Kernel-based Virtual Machine, and Vmware Vsphere are not vulnerable.
The severity of CVE-2022-42255 is high with a CVSS score of 7.8.
The potential impacts of CVE-2022-42255 include denial of service, information disclosure, or data tampering.
Yes, you can find more information about this vulnerability at the following references: [NVIDIA Customer Help](https://nvidia.custhelp.com/app/answers/detail/a_id/5415) and [Gentoo Security Advisory](https://security.gentoo.org/glsa/202310-02).