Security Experts:

Connect with us

Hi, what are you looking for?



NVIDIA Patches DoS Flaws in GPU Driver and vGPU Software

Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.

Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.

Two security flaws were addressed in the GPU display driver, the most important of them being CVE‑2020‑5957 (CVSS score of 8.4), a bug that resides in the NVIDIA Control Panel component of the GPU driver for Windows.

An attacker with local system access that exploits the vulnerability could leverage it to corrupt a system file, thus leading to a denial of service condition or escalation of privileges.

Another vulnerability addressed in the Windows GPU driver is CVE‑2020‑5958 (CVSS score of 6.7). Also residing in the Control Panel component, the flaw could be abused by a local attacker to plant a malicious DLL file, in order to achieve code execution, denial of service, or information disclosure.

NVIDIA addressed the bugs in GPU Display Driver version 442.50 (for GeForce, Quadro, and NVS products running R440 versions), version 432.28 (for Quadro, NVS running R430 versions), version 426.50 (for Quadro, NVS running R418 versions), and version 392.59 (for Quadro, NVS running R390 versions).

For Tesla products running R418 versions, GPU Display Driver version 426.50 addresses the flaws. An update for the R440 versions will be released the week of March 9, 2020.

NVIDIA patched three vulnerabilities in Virtual GPU Manager (vGPU software), the most important of them being CVE‑2020‑5959 (CVSS score of 7.8), an issue residing in the vGPU plugin. An input index value that is incorrectly validated could result in denial of service, NVIDIA explains in an advisory.

The second bug addressed in the vGPU software is CVE‑2020‑5960 (CVSS score of 6.5), an issue that resides in the kernel module (nvidia.ko), where a null pointer dereference may occur, potentially resulting in a DoS condition.

NVIDIA also patched a security flaw in the vGPU graphics driver for guest operating systems (CVE‑2020‑5961, CVSS score 5.5), where “incorrect resource clean up on a failure path can impact the guest VM, leading to denial of service.”

For vGPU software version 8.0 to 8.2, patches were released as part of version 8.3, vGPU graphics driver version 426.52 for Windows and version 418.130 for Linux. Fixes for vGPU software versions 9.0 to 9.2 will be released the week of March 9, and patches for versions 10.0 and 10.1 will arrive in April.

For Virtual GPU Manager (for Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, and Nutanix AHV), version 8.0 to 8.2, patches were released with version 8.3 (driver version 418.130). Fixes for versions 9.0 to 9.2 will arrive the week of March 9, while those for versions 10.0 and 10.1 are planned for April.

Related: NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience

Related: NVIDIA Patches Command Execution Vulnerability in GeForce Experience

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.