NVIDIA CUDA Toolkit 2.2

CPE Details

NVIDIA CUDA Toolkit 2.2
2.2
2022-04-07 12:53 +00:00
2022-04-07 15:10 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:nvidia:cuda_toolkit:2.2:*:*:*:*:*:*:*

Informations

Vendor

nvidia

Product

cuda_toolkit

Version

2.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-25523 2023-07-03 23:27 +00:00 NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in the nvdisasm binary file, where an attacker may cause a NULL pointer dereference by providing a user with a malformed ELF file. A successful exploit of this vulnerability may lead to a partial denial of service.
3.3
LOW
CVE-2023-25514 2023-04-22 02:36 +00:00 NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
6.6
MEDIUM
CVE-2023-25513 2023-04-22 02:35 +00:00 NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
6.6
MEDIUM
CVE-2023-25512 2023-04-22 02:35 +00:00 NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds memory read by running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
6.6
MEDIUM
CVE-2023-25511 2023-04-22 02:34 +00:00 NVIDIA CUDA Toolkit for Linux and Windows contains a vulnerability in cuobjdump, where a division-by-zero error may enable a user to cause a crash, which may lead to a limited denial of service.
3.3
LOW
CVE-2023-25510 2023-04-22 02:33 +00:00 NVIDIA CUDA Toolkit SDK for Linux and Windows contains a NULL pointer dereference in cuobjdump, where a local user running the tool against a malformed binary may cause a limited denial of service.
3.3
LOW
CVE-2023-0196 2023-03-02 01:23 +00:00 NVIDIA CUDA Toolkit SDK contains a bug in cuobjdump, where a local user running the tool against an ill-formed binary may cause a null- pointer dereference, which may result in a limited denial of service.
3.3
LOW
CVE-2023-0193 2023-03-02 01:19 +00:00 NVIDIA CUDA Toolkit SDK contains a vulnerability in cuobjdump, where a local user running the tool against a malicious binary may cause an out-of-bounds read, which may result in a limited denial of service and limited information disclosure.
4.4
MEDIUM
CVE-2022-34667 2022-11-17 23:00 +00:00 NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
4.4
MEDIUM
CVE-2022-21821 2022-03-29 18:05 +00:00 NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.
7.8
HIGH
CVE-2020-5991 2020-10-30 19:40 +00:00 NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure.
7.8
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.