Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34667

Опубликовано: 19 нояб. 2022
Источник: debian

Описание

NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nvidia-cuda-toolkitfixed11.8.0-1experimentalpackage
nvidia-cuda-toolkitfixed11.8.0-2package
nvidia-cuda-toolkitno-dsabullseyepackage
nvidia-cuda-toolkitno-dsabusterpackage

Примечания

  • https://nvidia.custhelp.com/app/answers/detail/a_id/5373

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 3 лет назад

NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.

CVSS3: 4.4
nvd
около 3 лет назад

NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.

CVSS3: 4.4
github
около 3 лет назад

NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.