Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Disaster Recovery

NVIDIA Ships Patches for High-Severity Security Flaws

NVIDIA this week announced the release of software updates for its GPU display drivers and vGPU software, with fixes for a total of 16 vulnerabilities.

NVIDIA this week announced the release of software updates for its GPU display drivers and vGPU software, with fixes for a total of 16 vulnerabilities.

A total of six security flaws were patched in the NVIDIA GPU display driver, all of them affecting the kernel mode layer. Three of the bugs impact Windows only, one affects only Linux systems, and two impact both Windows and Linux.

The most important of the issues is CVE‑2021‑1051 (CVSS score of 8.4), an issue affecting the GPU driver for Windows and which could lead to denial of service or escalation of privileges.

Next in line is CVE‑2021‑1052 (CVSS score of 7.8), a bug in NVIDIA’s driver for Windows and Linux leading to user-mode clients accessing legacy privileged APIs, which could be exploited for denial of service, escalation of privileges, and information disclosure.

Also leading to denial of service are the next two flaws addressed with this set of patches, namely CVE‑2021‑1053 (affecting Windows and Linux) and CVE‑2021‑1054 (impacting Windows only), NVIDIA explains in an advisory.

The remaining bugs could be exploited for denial of service and information disclosure. Featuring a CVSS score of 5.3, they are tracked as CVE‑2021‑1055 (impacts Windows) and CVE‑2021‑1056 (affects Linux systems).

Nine of the ten vulnerabilities addressed in NVIDIA vGPU software with this set of patches features a CVSS score of 7.8.

Affecting the guest kernel mode driver and the vGPU plugin of the NVIDIA vGPU software, two of the flaws (CVE‑2021‑1058 and CVE‑2021‑1060) could lead to tampering of data or denial of service.

Advertisement. Scroll to continue reading.

The remaining issues impact the vGPU plugin of the NVIDIA vGPU manager and could lead to integrity and confidentiality loss, tampering of data, denial of service, or information disclosure. Featuring a CVSS score of 5.5, the tenth vulnerability too affects the vGPU plugin.

NVIDIA released patches to address these vulnerabilities in GeForce, NVIDIA RTX/Quadro, and NVS display drivers for Windows and Linux, as well as Tesla drivers for Windows. Patches for Tesla drivers on Linux will be released in the next couple of weeks.

Patches were also released for vGPU software (guest driver) for Windows and Linux, and for vGPU software (Virtual GPU Manager) for Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM, Nutanix AHV.

Related: NVIDIA Patches AMI BMC Vulnerabilities Impacting Major Vendors

Related: NVIDIA Patches Code Execution Flaws in GeForce Experience

Related: NVIDIA Patches Code Execution Flaws in GPU Drivers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.