Integer Overflow or Wraparound Affecting nvidia-cuda-toolkit package, versions <11.6.2-2


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-NVIDIACUDATOOLKIT-2436864
  • published31 Mar 2022
  • disclosed29 Mar 2022

Introduced: 29 Mar 2022

CVE-2022-21821  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:unstable nvidia-cuda-toolkit to version 11.6.2-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nvidia-cuda-toolkit package and not the nvidia-cuda-toolkit package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.

CVSS Scores

version 3.1