NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for control calls where the software reads or writes to a buffer by using an index or pointer that references a memory location after the end of the buffer, which may lead to data tampering or denial of service.
References
Link | Resource |
---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/5211 | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202310-02 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Oct 2023, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) https://security.gentoo.org/glsa/202310-02 - Third Party Advisory |
03 Oct 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 7.1 |
CPE | cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:* | |
References | (CONFIRM) https://nvidia.custhelp.com/app/answers/detail/a_id/5211 - Patch, Vendor Advisory | |
CWE | CWE-120 |
22 Jul 2021, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-22 05:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-1090
Mitre link : CVE-2021-1090
CVE.ORG link : CVE-2021-1090
JSON object : View
Products Affected
nvidia
- gpu_display_driver
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')