Vulnerabilities

NVIDIA Patches DoS Flaws in GPU Driver and vGPU Software

Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.

<p><strong><span><span>Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.</span></span></strong></p>

Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.

Two security flaws were addressed in the GPU display driver, the most important of them being CVE‑2020‑5957 (CVSS score of 8.4), a bug that resides in the NVIDIA Control Panel component of the GPU driver for Windows.

An attacker with local system access that exploits the vulnerability could leverage it to corrupt a system file, thus leading to a denial of service condition or escalation of privileges.

Another vulnerability addressed in the Windows GPU driver is CVE‑2020‑5958 (CVSS score of 6.7). Also residing in the Control Panel component, the flaw could be abused by a local attacker to plant a malicious DLL file, in order to achieve code execution, denial of service, or information disclosure.

NVIDIA addressed the bugs in GPU Display Driver version 442.50 (for GeForce, Quadro, and NVS products running R440 versions), version 432.28 (for Quadro, NVS running R430 versions), version 426.50 (for Quadro, NVS running R418 versions), and version 392.59 (for Quadro, NVS running R390 versions).

For Tesla products running R418 versions, GPU Display Driver version 426.50 addresses the flaws. An update for the R440 versions will be released the week of March 9, 2020.

NVIDIA patched three vulnerabilities in Virtual GPU Manager (vGPU software), the most important of them being CVE‑2020‑5959 (CVSS score of 7.8), an issue residing in the vGPU plugin. An input index value that is incorrectly validated could result in denial of service, NVIDIA explains in an advisory.

The second bug addressed in the vGPU software is CVE‑2020‑5960 (CVSS score of 6.5), an issue that resides in the kernel module (nvidia.ko), where a null pointer dereference may occur, potentially resulting in a DoS condition.

Advertisement. Scroll to continue reading.

NVIDIA also patched a security flaw in the vGPU graphics driver for guest operating systems (CVE‑2020‑5961, CVSS score 5.5), where “incorrect resource clean up on a failure path can impact the guest VM, leading to denial of service.”

For vGPU software version 8.0 to 8.2, patches were released as part of version 8.3, vGPU graphics driver version 426.52 for Windows and version 418.130 for Linux. Fixes for vGPU software versions 9.0 to 9.2 will be released the week of March 9, and patches for versions 10.0 and 10.1 will arrive in April.

For Virtual GPU Manager (for Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, and Nutanix AHV), version 8.0 to 8.2, patches were released with version 8.3 (driver version 418.130). Fixes for versions 9.0 to 9.2 will arrive the week of March 9, while those for versions 10.0 and 10.1 are planned for April.

Related: NVIDIA Patches Flaws in GPU Display Driver, GeForce Experience

Related: NVIDIA Patches Command Execution Vulnerability in GeForce Experience

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version