Source: nvidia-cuda-toolkit X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for nvidia-cuda-toolkit. CVE-2024-0123[0]: | NVIDIA CUDA toolkit for Windows and Linux contains a vulnerability | in the nvdisasm command line tool where an attacker may cause an | improper validation in input issue by tricking the user into running | nvdisasm on a malicious ELF file. A successful exploit of this | vulnerability may lead to denial of service. CVE-2024-0124[1]: | NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability | in the nvdisam command line tool, where a user can cause nvdisasm to | read freed memory by running it on a malformed ELF file. A | successful exploit of this vulnerability might lead to a limited | denial of service. CVE-2024-0125[2]: | NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability | in the nvdisam command line tool, where a user can cause a NULL | pointer dereference by running nvdisasm on a malformed ELF file. A | successful exploit of this vulnerability might lead to a limited | denial of service. https://nvidia.custhelp.com/app/answers/detail/a_id/5577 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-0123 https://www.cve.org/CVERecord?id=CVE-2024-0123 [1] https://security-tracker.debian.org/tracker/CVE-2024-0124 https://www.cve.org/CVERecord?id=CVE-2024-0124 [2] https://security-tracker.debian.org/tracker/CVE-2024-0125 https://www.cve.org/CVERecord?id=CVE-2024-0125 Please adjust the affected versions in the BTS as needed.