Lucene search

K
nvidiaNvidiaNVIDIA:5517
HistoryApr 03, 2024 - 12:00 a.m.

Security Bulletin: NVIDIA CUDA Toolkit - April 2024

2024-04-0300:00:00
nvidia.custhelp.com
11
nvidia
cuda toolkit
security update
cuobjdump
nvdisasm
denial of service
vulnerability
input validation
nvjpeg2000 library
nvtiff library
windows
linux
cve-2024-0072
cve-2024-0076
cve-2023-31028
cve-2024-0080

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%

NVIDIA has released a software update for NVIDIA® CUDA® Toolkit. To protect your system, download and install this software update from the CUDA Toolkit Downloads page.

Go to NVIDIA Product Security.

Details

This section provides a summary of potential vulnerabilities that this security update addresses and their impact. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.

CVE ID Description Vector Base Score Severity CWE Impacts
CVE‑2024‑0072 NVIDIA CUDA toolkit for all platforms contains a vulnerability in cuobjdump and nvdisasm where an attacker may cause a crash by tricking a user into reading a malformed ELF file. A successful exploit of this vulnerability may lead to a partial denial of service.

AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

| 3.3 | Low | CWE‑476 | Denial of service
CVE-2024-0076 | NVIDIA CUDA toolkit for all platforms contains a vulnerability in cuobjdump and nvdisasm where an attacker may cause a crash by tricking a user into reading a malformed ELF file. A successful exploit of this vulnerability may lead to a partial denial of service. | AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L | 3.3 | Low | CWE‑125 | Denial of service
CVE-2023-31028 | NVIDIA nvJPEG2000 Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service. | AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L | 2.8 | Low | CWE‑20 | Denial of service
CVE-2024-0080 | NVIDIA nvTIFF Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service. | AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L | 2.8 | Low | CWE‑20 | Denial of service

The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends evaluating the risk to your specific configuration.

Security Updates

The following table lists the NVIDIA products affected, versions affected, and the updated version that includes this security update.

CVE IDs Addressed Affected Products Platform or OS Affected Versions Updated Version

CVE‑2024-0072

CVE-2024-0076

| NVIDIA CUDA Toolkit | Windows, Linux | All versions prior to CUDA Toolkit v12.4 |

CUDA Toolkit v12.4U1

CVE-2023-31028 | nvJPEG2000 Library | Windows, Linux | All versions prior to nvJPEG2000 v0.7.x | nvJPEG2000 v0.7.x
CVE-2024-0080 | nvTIFF Library | Windows, Linux | All versions prior to nvTIFF v0.3.0 | nvTIFF v0.3.0

Notes

  • Earlier software releases of this product are also affected. If you are using an earlier release, upgrade to the latest release version.

Acknowledgements

NVIDIA thanks the following finders for reporting these issues:

  • CVE-2024‑0072, CVE-2024-0076: Matteo Marini and Daniele Cono D’Elia
  • CVE‑2023-31028, CVE-2024-0080: hjy79425575

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

8.7%