Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.
Two security flaws were addressed in the GPU display driver, the most important of them being CVE‑2020‑5957 (CVSS score of 8.4), a bug that resides in the NVIDIA Control Panel component of the GPU driver for Windows.
An attacker with local system access that exploits the vulnerability could leverage it to corrupt a system file, thus leading to a denial of service condition or escalation of privileges.
Another vulnerability addressed in the Windows GPU driver is CVE‑2020‑5958 (CVSS score of 6.7). Also residing in the Control Panel component, the flaw could be abused by a local attacker to plant a malicious DLL file, in order to achieve code execution, denial of service, or information disclosure.
NVIDIA addressed the bugs in GPU Display Driver version 442.50 (for GeForce, Quadro, and NVS products running R440 versions), version 432.28 (for Quadro, NVS running R430 versions), version 426.50 (for Quadro, NVS running R418 versions), and version 392.59 (for Quadro, NVS running R390 versions).
For Tesla products running R418 versions, GPU Display Driver version 426.50 addresses the flaws. An update for the R440 versions will be released the week of March 9, 2020.
NVIDIA patched three vulnerabilities in Virtual GPU Manager (vGPU software), the most important of them being CVE‑2020‑5959 (CVSS score of 7.8), an issue residing in the vGPU plugin. An input index value that is incorrectly validated could result in denial of service, NVIDIA explains in an advisory.
The second bug addressed in the vGPU software is CVE‑2020‑5960 (CVSS score of 6.5), an issue that resides in the kernel module (nvidia.ko), where a null pointer dereference may occur, potentially resulting in a DoS condition.
NVIDIA also patched a security flaw in the vGPU graphics driver for guest operating systems (CVE‑2020‑5961, CVSS score 5.5), where “incorrect resource clean up on a failure path can impact the guest VM, leading to denial of service.”
For vGPU software version 8.0 to 8.2, patches were released as part of version 8.3, vGPU graphics driver version 426.52 for Windows and version 418.130 for Linux. Fixes for vGPU software versions 9.0 to 9.2 will be released the week of March 9, and patches for versions 10.0 and 10.1 will arrive in April.
For Virtual GPU Manager (for Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, and Nutanix AHV), version 8.0 to 8.2, patches were released with version 8.3 (driver version 418.130). Fixes for versions 9.0 to 9.2 will arrive the week of March 9, while those for versions 10.0 and 10.1 are planned for April.
Related: NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience
Related: NVIDIA Patches Command Execution Vulnerability in GeForce Experience

More from Ionut Arghire
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- Vulnerability Provided Access to Toyota Supplier Management Network
- Linux Variant of Cl0p Ransomware Emerges
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
