AVID-2026-R1054
Description
Vulnerability CVE-2022-34667
Details
NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
Reason for inclusion in AVID: The CVE describes a software vulnerability in NVIDIA CUDA Toolkit cuobjdump, a component commonly used in AI/ML workflows for building or inspecting GPU-accelerated binaries. It is a software supply chain component used in AI systems (toolchain/dependency). The vulnerability is security-related (stack-based buffer overflow leading to DoS and potential data integrity impact). The report provides explicit evidence (affected product, vulnerability type, impact, CVSS metrics).
References
Affected or Relevant Artifacts
- Developer: NVIDIA
- Deployer: NVIDIA
- Artifact Details:
| Type | Name |
|---|---|
| System | NVIDIA CUDA Toolkit |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
| Base Score | 4.4 |
| Base Severity | 🟠 Medium |
| Attack Vector | LOCAL |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | 🟢 Low |
| Availability Impact | 🟢 Low |
CWE
| ID | Description |
|---|---|
| CWE-121 | CWE-121 Stack-based Buffer Overflow |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-11-18
- Version: 0.3.3
- AVID Entry