First published: Fri Dec 30 2022(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Virtual GPU Graphics Driver | <11.11 | |
Nvidia Virtual GPU Graphics Driver | >=12.0<13.6 | |
Nvidia Virtual GPU Graphics Driver | >=14.0<14.4 | |
Citrix Hypervisor | ||
Linux Kernel | ||
Red Hat Enterprise Linux Kernel-based Virtual Machine | ||
VMware vSphere | ||
NVIDIA Cloud Gaming | <525.60.12 | |
NVIDIA GPU Display Driver | >=470<470.161.03 | |
NVIDIA GPU Display Driver | >=510<510.108.03 | |
NVIDIA GeForce | ||
NVIDIA NVS Firmware | ||
NVIDIA | ||
NVIDIA RTX | ||
NVIDIA GPU Display Driver | >=450<450.216.04 | |
NVIDIA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42262 is a vulnerability in the NVIDIA vGPU software Virtual GPU Manager (vGPU plugin) that can lead to buffer overrun, data tampering, information disclosure, or denial of service.
NVIDIA Virtual GPU software versions 11.11 to 13.6 and 14.0 to 14.4 are affected by CVE-2022-42262.
The severity of CVE-2022-42262 is high (CVSS score 7.8).
CVE-2022-42262 can be exploited by sending specially crafted input to the Virtual GPU Manager, causing a buffer overrun.
Yes, NVIDIA has released a fix for CVE-2022-42262. It is recommended to update to the latest version of the NVIDIA vGPU software.