Nvidia Security Bullitin discloses “High Severity” vulnerabilities
Update your drivers – Nvidia has fixed a lot of vulnerabilities with their latest GeForce drivers
Nvidia has released a new security bulletin detailing seven new vulnerabilities in its GPU display drivers and VGPU software. These vulnerabilities range from low to high severity, with one driver vulnerability allowing for “Information disclosure, denial of service, and data tampering.”
Nvidia’s display driver vulnerabilities impact GeForce, RTX, Quadro, Tesla, and NVS users on Windows and Linux. To mitigate these issues, Nvidia recommends updating to its latest GPU drivers. Below are Nvidia’s official guidelines.
NVIDIA has released a software security update for NVIDIA GPU Display Driver to address the issues that are disclosed in this bulletin.
To protect your system, download and install this software update through the NVIDIA Driver Downloads page or, for the vGPU software and Cloud Gaming updates, through the NVIDIA Licensing Portal.
(Details from the January 16th Nvidia Security Bullitin)
To ensure that your system is safe, users of Nvidia GPUs should update their system to Nvidia’s newest display drivers. Nvidia claims that Windows driver versions prior to versions 553.62 and 539.19 on their R550 and R535 driver branches are affected by these vulnerabilities. Note that Nvidia’s newest Game Ready/Studio driver is version 566.36 and isn’t susceptible to these vulnerabilities. Furthermore, these drivers have been available for over a month.
PC gamers with the Nvidia App (or GeForce Experience) installed should be prompted to install Nvidia’s newest display drivers. If you want to update your GPU drivers manually, you can do so through Nvidia’s GeForce driver download page.
You can join the discussion on Nvidia’s GPU Driver Vulnerabilities on the OC3D Forums.