![]() Nvidia-cuda-toolkit 11.5.2-4 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.5.2-4 (source) into unstable Nvidia-cuda-toolkit 11.6.2-2 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.6.2-2 (source) into unstable Nvidia-cuda-toolkit 11.6.2-3 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.6.2-3 (source) into unstable Nvidia-cuda-toolkit 11.6.2-4 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.6.2-4 (source) into unstableĪccepted nvidia-cuda-toolkit 11.7.0-1 (source amd64) into experimental Nvidia-cuda-toolkit 11.6.2-6 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.6.2-6 (source) into unstableĪccepted nvidia-cuda-toolkit 11.6.2-5 (source) into unstableĪccepted nvidia-cuda-toolkit 11.7.1-1 (source amd64 all) into experimental Nvidia-cuda-toolkit 11.7.0-2 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.7.1-2 (source) into unstableĪccepted nvidia-cuda-toolkit 11.7.0-2 (source) into unstable Nvidia-cuda-toolkit 11.7.1-4 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.7.1-5 (source) into unstableĪccepted nvidia-cuda-toolkit 11.8.0-1 (source amd64 all) into experimentalĪccepted nvidia-cuda-toolkit 11.7.1-4 (source) into unstableĪccepted nvidia-cuda-toolkit 11.7.1-3 (source) into unstable Nvidia-cuda-toolkit 11.8.0-2 MIGRATED to testingĪccepted nvidia-cuda-toolkit 11.8.0-2 (source) into unstable You can find information about how to handle these issues in the security team's documentation. NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user. ![]() Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity. ![]() NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. NVIDIA CUDA Toolkit SDK contains a bug in cuobjdump, where a local user running the tool against an ill-formed binary may cause a null- pointer dereference, which may result in a limited denial of service. NVIDIA CUDA Toolkit SDK contains a vulnerability in cuobjdump, where a local user running the tool against a malicious binary may cause an out-of-bounds read, which may result in a limited denial of service and limited information disclosure. 4 issues left for the package maintainer to handle: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |