First published: Fri Dec 30 2022(Updated: )
NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA Virtual GPU | <11.11 | |
NVIDIA Virtual GPU | >=12.0<13.6 | |
NVIDIA Virtual GPU | >=14.0<14.4 | |
Citrix Hypervisor | ||
Linux Linux kernel | ||
Redhat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
Nvidia Cloud Gaming | <525.60.11 | |
Nvidia Gpu Display Driver | >=470<470.161.03 | |
Nvidia Gpu Display Driver | >=510<510.108.03 | |
Nvidia Geforce | ||
Nvidia Nvs | ||
Nvidia Quadro | ||
Nvidia Rtx | ||
Nvidia Gpu Display Driver | >=450<450.216.04 | |
Nvidia Tesla | ||
Nvidia Cloud Gaming | <525.60.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42260 is a vulnerability in the NVIDIA vGPU Display Driver for Linux guest, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, leading to various potential consequences.
The severity of CVE-2022-42260 is high, with a CVSS score of 7.8.
NVIDIA Virtual GPU versions up to and including 11.11 are affected by CVE-2022-42260.
To fix CVE-2022-42260, users should update their NVIDIA vGPU Display Driver for Linux guest to a non-vulnerable version.
No, Citrix Hypervisor and Linux kernel are not vulnerable to CVE-2022-42260.