First published: Fri Dec 30 2022(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
Credit: psirt@nvidia.com psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA vGPU Software | <11.11 | |
NVIDIA vGPU Software | >=12.0<13.6 | |
NVIDIA vGPU Software | >=14.0<14.4 | |
Citrix Hypervisor | ||
Linux Kernel | ||
Red Hat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
NVIDIA Cloud Gaming | <525.60.12 | |
NVIDIA GPU Display Driver Linux | >=470<470.161.03 | |
NVIDIA GPU Display Driver Linux | >=510<510.108.03 | |
NVIDIA GeForce | ||
NVIDIA NVS Firmware | ||
NVIDIA Quadro | ||
NVIDIA RTX | ||
NVIDIA GPU Display Driver Linux | >=450<450.216.04 | |
NVIDIA tesla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-42261.
The severity of CVE-2022-42261 is high (7.8).
The affected software includes Nvidia Virtual Gpu versions up to 11.11, versions between 12.0 and 13.6, and versions between 14.0 and 14.4.
The possible impacts of this vulnerability include buffer overrun, data tampering, information disclosure, and denial of service.
Citrix Hypervisor, Linux Kernel, Redhat Enterprise Linux Kernel-based Virtual Machine, and Vmware Vsphere are not vulnerable to this vulnerability.