EVGA

Urgent security warning: NVIDIA urges GeForce users to update drivers

Author
Cool GTX
EVGA Forum Moderator
  • Total Posts : 31064
  • Reward points : 0
  • Joined: 2010/12/12 14:22:25
  • Location: Folding for the Greater Good
  • Status: offline
  • Ribbons : 123
2024/11/08 03:50:06 (permalink)
Urgent security warning: NVIDIA urges GeForce users to update drivers – Eight critical vulnerabilities discovered
5. November 2024 06:00
Samir Bashir
 
(Excerpt)
 

Details of the security vulnerabilities

The identified vulnerabilities affect both the NVIDIA GPU Display Driver and the NVIDIA VGPU software. These driver components control the display and management of graphical content on Windows and Linux systems. The vulnerabilities may allow an attacker with elevated privileges to execute malicious code or gain access to sensitive data. Possible attack scenarios include code execution, denial of service, escalation of privileges and information theft. The risk is rated between 7.1 and 8.2 on the CVSS scale, underlining the severity of the threat.

Affected driver versions and recommended updates

(formatting changed from article & bold added for clarity)


To minimize the risk, NVIDIA has provided updated driver versions that close the vulnerabilities. The recommended versions vary depending on the operating system and GPU model.


- Windows users using GeForce, RTX, Quadro or NVS GPUs should update to versions 566.03, 553.24 or 538.95.


- Versions 553.24 and 538.95 are intended for NVIDIA Tesla GPUs.


- Linux users should install versions 565.57.01, 550.127.05 or 535.216.01, depending on the GPU model, to ensure that the gaps are closed.

Risk for users without an update

Ignoring these updates could leave systems open to attack. Particularly dangerous is the potential escalation of privileges, which opens up a wide range of manipulation possibilities for attackers. The vulnerabilities in the previous drivers offer attackers the opportunity to gain full access to a system and compromise personal data or influence system behavior. Especially in corporate environments that rely on professional GPUs such as Quadro and Tesla, unclosed security gaps can have serious consequences.
 
----------------- ( end excerpt) ----------------
Time to plug some more security holes
 
Also posted & Pinned this information, in the GPU Sections 

Learn your way around the EVGA Forums, Rules & limits on new accounts Ultimate Self-Starter Thread For New Members

I am a Volunteer Moderator - not an EVGA employee

Older RIG projects RTX Project  Nibbler


 When someone does not use reason to reach their conclusion in the first place; you can't use reason to convince them otherwise!
#1

2 Replies Related Threads

    Cool GTX
    EVGA Forum Moderator
    • Total Posts : 31064
    • Reward points : 0
    • Joined: 2010/12/12 14:22:25
    • Location: Folding for the Greater Good
    • Status: offline
    • Ribbons : 123
    Re: Urgent security warning: NVIDIA urges GeForce users to update drivers 2024/11/11 10:25:45 (permalink)
    running 566.03, no issues to report on W10 Pro

    Learn your way around the EVGA Forums, Rules & limits on new accounts Ultimate Self-Starter Thread For New Members

    I am a Volunteer Moderator - not an EVGA employee

    Older RIG projects RTX Project  Nibbler


     When someone does not use reason to reach their conclusion in the first place; you can't use reason to convince them otherwise!
    #2
    bdary
    Omnipotent Enthusiast
    • Total Posts : 10546
    • Reward points : 0
    • Joined: 2008/04/25 14:08:16
    • Location: Florida
    • Status: offline
    • Ribbons : 118
    Re: Urgent security warning: NVIDIA urges GeForce users to update drivers 2024/11/12 07:28:58 (permalink)
    Cool GTX
    running 566.03, no issues to report on W10 Pro


    I had been using that driver on Win 11 for a couple weeks without issue as well. I just installed the most recent Nvidia driver this morning though. We'll see how it works out.


     
     
     
     
     
     
     
     
     
     
     
    #3
    Jump to:
  • Back to Mobile