NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5373 | Patch Vendor Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/5373 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5373 - Patch, Vendor Advisory |
Information
Published : 2022-11-19 00:15
Updated : 2024-11-21 07:09
NVD link : CVE-2022-34667
Mitre link : CVE-2022-34667
CVE.ORG link : CVE-2022-34667
JSON object : View
Products Affected
linux
- linux_kernel
microsoft
- windows
nvidia
- cuda_toolkit