NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Citrix
Subscribe
|
Hypervisor
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Microsoft
Subscribe
|
Windows
Subscribe
|
|
Nutanix
Subscribe
|
Ahv
Subscribe
|
|
Nvidia
Subscribe
|
Virtual Gpu Manager
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux Kernel-based Virtual Machine
Subscribe
|
|
Vmware
Subscribe
|
Vsphere
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-6527 | NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_id/5142 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2024-08-03T15:55:18.569Z
Reserved: 2020-11-12T00:00:00
Link: CVE-2021-1060
No data.
Status : Modified
Published: 2021-01-08T15:15:12.203
Modified: 2024-11-21T05:43:30.990
Link: CVE-2021-1060
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD