If attackers successfully exploit vulnerabilities in Nvidia’s graphics card driver, they can crash services, gain unauthorized access to information or even execute malicious code. On the other hand, secure versions for Linux and Windows are available for download. The developers have also closed gaps in the vGPU software.
Read more after the ad
Malicious code attacks are conceivable
According to a warning message, eight of the 13 software vulnerabilities in the GPU driver have a threat level of “hoch“ Classified. In all cases, attackers can provoke memory errors in a way that is not described in detail and then do evil things.
Nvidia vGPU is also susceptible to memory errors. So far, there is no indication from the graphics card manufacturer that attackers are already exploiting the security gaps. It is currently unknown which parameters admins can use to identify systems that have already been attacked.
To prevent possible attacks, the developers have released the following driver versions:
Linux:
- 535.309.01
- 580.159.03
- 595.71.05
Read more after the ad
Windows:
(of the)
