Vulnerability Description
NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nvidia | Virtual Gpu Manager | >= 11.0, < 11.4 |
| Citrix | Hypervisor | - |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
| Redhat | Enterprise Linux Kernel-Based Virtual Machine | - |
| Vmware | Vsphere | - |
Related Weaknesses (CWE)
References
- https://nvidia.custhelp.com/app/answers/detail/a_id/5172Vendor Advisory
- https://nvidia.custhelp.com/app/answers/detail/a_id/5172Vendor Advisory
FAQ
What is CVE-2021-1084?
CVE-2021-1084 is a vulnerability with a CVSS score of 7.8 (HIGH). NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, ...
How severe is CVE-2021-1084?
CVE-2021-1084 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-1084?
Check the references section above for vendor advisories and patch information. Affected products include: Nvidia Virtual Gpu Manager, Citrix Hypervisor, Linux Linux Kernel, Microsoft Windows, Redhat Enterprise Linux Kernel-Based Virtual Machine.