NVIDIA Releases Security Update to Fix GPU Driver Vulnerabilities and Prevent Data Leakage and System Compromise

NVIDIA Releases Security Update to Fix GPU Driver Vulnerabilities and Prevent Data Leakage and System Compromise

NVIDIA has effectively tackled multiple vulnerabilities through their latest software security update aimed at GPU display drivers. This proactive measure is crucial in safeguarding host systems from potential threats.

Key Highlights of NVIDIA’s Security Update: Addressing High-Risk Vulnerabilities

The recent patch from NVIDIA, often referred to as “Team Green,”has resolved a total of eight security vulnerabilities, of which two are classified as high-risk. The first critical vulnerability, identified as CVE-2024-0150, pertains to a “buffer overflow”issue within the GPU display driver. This flaw could allow malicious actors to manipulate memory buffers, which poses a risk of large-scale system compromises, potentially leading to the leakage or unauthorized alteration of personal data.

NVIDIA Security Update

The second vulnerability targets the virtual GPU manager, causing memory corruption that could permit an adversary operating as a guest user to execute arbitrary code or manipulate personal information. While additional six flaws were also rectified in this update, they are classified as medium severity and therefore will not be elaborated upon in detail.

NVIDIA Driver Update

To benefit from these important updates, users must update to driver version 553.62 or 539.19 if they are on Windows. For Linux users, versions v550.144.03 or v535.230.02 are required, depending on the specific driver branch in use. NVIDIA has noted that the vulnerabilities could affect a wide range of products, including consumer GeForce GPUs, the NVIDIA RTX series, Quadro, NVS, and Tesla product lines, which highlights the urgency for users to ensure their drivers are up to date.

Stay protected and ensure your systems are secure by promptly applying these updates.

News Source: TechPowerUP

Source & Images

Leave a Reply

Your email address will not be published. Required fields are marked *