Monday, January 20th 2025
NVIDIA Fixes High-Risk GPU Driver Vulnerabilities That Allow Code Execution and Data Theft
NVIDIA has released urgent security patches addressing eight vulnerabilities in its GPU drivers and virtual GPU software that affect both Windows and Linux systems. The January 16 update targets multiple security flaws that could enable attackers with local access to execute malicious code, steal data, or crash affected systems. Two high-severity vulnerabilities stand out among the patches. The first (CVE-2024-0150) involves a buffer overflow in the GPU display driver that could lead to system compromise through data tampering and information disclosure. The second critical issue (CVE-2024-0146) affects the virtual GPU Manager, where a compromised guest system could trigger memory corruption, potentially leading to code execution and system takeover. For Windows systems, users must update to version 553.62 (R550 branch) or 539.19 (R535 branch). Linux users need to install version 550.144.03 or 535.230.02, depending on their driver branch.
The updates cover NVIDIA's RTX, Quadro, NVS, and Tesla product lines. Enterprise environments using NVIDIA's virtualization technology face additional risks. One vulnerability (CVE-2024-53881) allows guest systems to launch interrupt storms against host machines, potentially causing system-wide outages. To patch these security holes, virtual GPU software users must update to version 17.5 (550.144.02) or 16.9 (535.230.02). The vulnerabilities specifically target systems where attackers have local access, which means remote exploitation is unlikely. However, in virtualized environments where multiple users share GPU resources, these flaws pose a significant security risk. System administrators can download the security updates from NVIDIA's Driver Downloads page, while enterprise vGPU customers should obtain patches through the NVIDIA Licensing Portal. NVIDIA recommends immediate installation of these updates across all affected systems.
Source:
NVIDIA
The updates cover NVIDIA's RTX, Quadro, NVS, and Tesla product lines. Enterprise environments using NVIDIA's virtualization technology face additional risks. One vulnerability (CVE-2024-53881) allows guest systems to launch interrupt storms against host machines, potentially causing system-wide outages. To patch these security holes, virtual GPU software users must update to version 17.5 (550.144.02) or 16.9 (535.230.02). The vulnerabilities specifically target systems where attackers have local access, which means remote exploitation is unlikely. However, in virtualized environments where multiple users share GPU resources, these flaws pose a significant security risk. System administrators can download the security updates from NVIDIA's Driver Downloads page, while enterprise vGPU customers should obtain patches through the NVIDIA Licensing Portal. NVIDIA recommends immediate installation of these updates across all affected systems.
16 Comments on NVIDIA Fixes High-Risk GPU Driver Vulnerabilities That Allow Code Execution and Data Theft
Yes, it’s the maintenance man. He knows I like orange. They do that on purpose.
Where did you see the performance reduced?
I can accuse Nvidia of a lot, but purposely killing their own cards over time isn't one, despite all the doom and gloom stories that we've seen over time, and the supposed gap with AMD's fine wine approach that never materialized in earnest.
It's been out since december 5th
Not that keen on keeping things i can patch unpached so what's up?
www.nvidia.com/en-us/drivers/details/238728/
They've also patched the previous Release 535 driver:
www.nvidia.com/en-us/drivers/details/238726/
Linux KERNEL + userspace + nvidia driver = insecure system :) It depends if the user is smart or not. I think that statement misses an information. Gentoo linux has another newer version also in the repository. Is that also affected? According to the text it is, becuase it does not say ... "or newer".
source: packages.gentoo.org/packages/x11-drivers/nvidia-drivers/changelog That does not look very good - a few days only. And already an annoucement for the issue.
On a sidenote: Nvidia is not really a recommendation for a box with a linux kernel. Lot'S of overhead. I tested it for a few months again in 2023.