CVE-2022-34667

NameCVE-2022-34667
DescriptionNVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1021625

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nvidia-cuda-toolkit (PTS)buster/non-free9.2.148-7+deb10u1vulnerable
bullseye/non-free11.2.2-3+deb11u3vulnerable
bookworm/non-free11.8.0-5~deb12u1fixed
trixie/non-free12.0.1-4fixed
sid/non-free12.0.1-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nvidia-cuda-toolkitsourceexperimental11.8.0-1
nvidia-cuda-toolkitsource(unstable)11.8.0-21021625

Notes

[bullseye] - nvidia-cuda-toolkit <no-dsa> (Non-free not supported)
[buster] - nvidia-cuda-toolkit <no-dsa> (Minor issue)
https://nvidia.custhelp.com/app/answers/detail/a_id/5373

Search for package or bug name: Reporting problems