NVIDIA Ships Patches for High-Severity Security Flaws

NVIDIA this week announced the release of software updates for its GPU display drivers and vGPU software, with fixes for a total of 16 vulnerabilities.


A total of six security flaws were patched in the NVIDIA GPU display driver, all of them affecting the kernel mode layer. Three of the bugs impact Windows only, one affects only Linux systems, and two impact both Windows and Linux.


The most important of the issues is CVE‑2021‑1051 (CVSS score of 8.4), an issue affecting the GPU driver for Windows and which could lead to denial of service or escalation of privileges.


Next in line is CVE‑2021‑1052 (CVSS score of 7.8), a bug in NVIDIA’s driver for Windows and Linux leading to user-mode clients accessing legacy privileged APIs, which could be exploited for denial of service, escalation of privileges, and information disclosure.


Also leading to denial of service are the next two flaws addressed with this set of patches, namely CVE‑2021‑1053 (affecting Windows and Linux) and CVE‑2021‑1054 (impacting Windows only), NVIDIA explains in an advisory.


The remaining bugs could be exploited for denial of service and information disclosure. Featuring a CVSS score of 5.3, they are tracked as CVE‑2021‑1055 (impacts Windows) and CVE‑2021‑1056 (affects Linux systems).


Nine of the ten vulnerabilities addressed in NVIDIA vGPU software with this set of patches features a CVSS score of 7.8.


Affecting the guest kernel mode driver and the vGPU plugin of the NVIDIA vGPU software, two of the flaws (CVE‑2021‑1058 and CVE‑2021‑1060) could lead to tampering of data or denial of service.


The remaining issues impact the vGPU plugin of the NVIDIA vGPU manager and could lead to integrity and confidentiality loss, tampering of ..

Support the originator by clicking the read the rest link below.