NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for control calls where the software reads or writes to a buffer by using an index or pointer that references a memory location after the end of the buffer, which may lead to data tampering or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5211 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5211 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5211 - Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202310-02 - Third Party Advisory |
13 Oct 2023, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) https://security.gentoo.org/glsa/202310-02 - Third Party Advisory |
03 Oct 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-07-22 05:15
Updated : 2024-11-21 05:43
NVD link : CVE-2021-1090
Mitre link : CVE-2021-1090
CVE.ORG link : CVE-2021-1090
JSON object : View
Products Affected
nvidia
- gpu_display_driver
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')