NVIDIA Patches DoS Flaws in GPU Driver and vGPU Software

Software security updates NVIDIA released on Friday address multiple denial-of-service (DoS) vulnerabilities in GPU display drivers and Virtual GPU Manager software.


Two security flaws were addressed in the GPU display driver, the most important of them being CVE‑2020‑5957 (CVSS score of 8.4), a bug that resides in the NVIDIA Control Panel component of the GPU driver for Windows.


An attacker with local system access that exploits the vulnerability could leverage it to corrupt a system file, thus leading to a denial of service condition or escalation of privileges.


Another vulnerability addressed in the Windows GPU driver is CVE‑2020‑5958 (CVSS score of 6.7). Also residing in the Control Panel component, the flaw could be abused by a local attacker to plant a malicious DLL file, in order to achieve code execution, denial of service, or information disclosure.


NVIDIA addressed the bugs in GPU Display Driver version 442.50 (for GeForce, Quadro, and NVS products running R440 versions), version 432.28 (for Quadro, NVS running R430 versions), version 426.50 (for Quadro, NVS running R418 versions), and version 392.59 (for Quadro, NVS running R390 versions).


For Tesla products running R418 versions, GPU Display Driver version 426.50 addresses the flaws. An update for the R440 versions will be released the week of March 9, 2020.


NVIDIA patched three vulnerabilities in Virtual GPU Manager (vGPU software), the most important of them being CVE‑2020‑5959 (CVSS score of 7.8), an issue residing in the vGPU plugin. An input index value that is incorrectly validated could result in denial of service, NVIDIA explains in an advisory.


The second bug addressed in the vGPU software is CVE‑2020‑5960 (CVSS score of 6.5), an issue that resides in the kernel module (nvidia.ko), where a nul ..

Support the originator by clicking the read the rest link below.