CVE-2022-34667

NameCVE-2022-34667
DescriptionNVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1021625

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nvidia-cuda-toolkit (PTS)jessie/non-free6.0.37-5vulnerable
stretch/non-free8.0.44-4vulnerable
buster/non-free9.2.148-7+deb10u1vulnerable
bullseye/non-free11.2.2-3+deb11u3vulnerable
bookworm/non-free11.8.0-5~deb12u1fixed
trixie/non-free, sid/non-free12.2.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nvidia-cuda-toolkitsourceexperimental11.8.0-1
nvidia-cuda-toolkitsourcejessie(unfixed)end-of-life
nvidia-cuda-toolkitsourcestretch(unfixed)end-of-life
nvidia-cuda-toolkitsource(unstable)11.8.0-21021625

Notes

[bullseye] - nvidia-cuda-toolkit <no-dsa> (Non-free not supported)
[buster] - nvidia-cuda-toolkit <no-dsa> (Minor issue)
https://nvidia.custhelp.com/app/answers/detail/a_id/5373

Search for package or bug name: Reporting problems