Nvidia patches a whole host of GPU driver security bugs

Nvidia has corrected a set of bugs affecting its GPU display driver, addressing issues that may have led to “code execution, denial of service, privilege escalation, information disclosure, or data manipulation.”

The security bulletin addressed 29 vulnerabilities in total, ranging in severity widely, that could see devices such as the flagship GeForce and RTX line of graphics cards, and the NVIDIA Studio platform used as vulnerable. endpoints by cyber criminals.

The latest update comes as Nvidia Still showing clear dominance within the GPU realm; Nvidia captured 88% of the GPU market in the third quarter, compared to just 8% for AMD and 4% for Intel according to Jon Peddie Research (JPR).

What are the biggest risks?

The biggest issue identified was dubbed CVE‑2022‑34669 and rated 8.8. This contained a vulnerability in the user-mode layer, whereby an unprivileged normal user could access or modify system files or other files important to the application.

CVE‑2022‑34671 came in second with a score of 8.5, which is another example of a user-mode layer vulnerability where an ordinary non-privileged user can cause what is called an “out-of-bounds write”.

To avoid these types of security issues and protect your system, NVIDIA suggests downloading and installing software updates via the administrator NVIDIA driver downloads (Opens in a new tab) page.

Alternatively, for vGPU software and NVIDIA Cloud Gaming updates, you can head over to NVIDIA Licensing Portal (Opens in a new tab). (Opens in a new tab)

Across log (Opens in a new tab)

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version