Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-21821

Опубликовано: 29 мар. 2022
Источник: debian
EPSS Низкий

Описание

NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nvidia-cuda-toolkitfixed11.6.2-1experimentalpackage
nvidia-cuda-toolkitfixed11.6.2-2package
nvidia-cuda-toolkitno-dsabullseyepackage
nvidia-cuda-toolkitno-dsabusterpackage

Примечания

  • https://nvidia.custhelp.com/app/answers/detail/a_id/5334

EPSS

Процентиль: 55%
0.00324
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.

CVSS3: 7.8
nvd
почти 4 года назад

NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.

CVSS3: 7.8
github
почти 4 года назад

NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.

EPSS

Процентиль: 55%
0.00324
Низкий