NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5142 | Vendor Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5142 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5142 - Vendor Advisory |
Information
Published : 2021-01-08 15:15
Updated : 2024-11-21 05:43
NVD link : CVE-2021-1060
Mitre link : CVE-2021-1060
CVE.ORG link : CVE-2021-1060
JSON object : View
Products Affected
vmware
- vsphere
nutanix
- ahv
redhat
- enterprise_linux_kernel-based_virtual_machine
linux
- linux_kernel
microsoft
- windows
citrix
- hypervisor
nvidia
- virtual_gpu_manager
CWE
CWE-20
Improper Input Validation