CVE-2021-1083Improper Validation of Specified Quantity in Input in Nvidia Virtual GPU Manager

Severity
7.8HIGHNVD
EPSS
0.1%
top 83.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 29
Latest updateJun 19

Description

NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDnvidia/virtual_gpu_manager11.011.4+1
CVEListV5nvidia/nvidia_virtual_gpu_softwarevGPU version prior to 11.4, and all version prior to 12.2

🔴Vulnerability Details

2
GHSA
GHSA-grvv-9pg8-j3cw: NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not v2022-05-24
CVEList
CVE-2021-1083: NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not v2021-04-29

📋Vendor Advisories

1
Red Hat
kernel: mptcp: remove tcp ulp setsockopt support2024-06-19
CVE-2021-1083 — Nvidia vulnerability | cvebase