• Welcome to Overclockers Forums! Join us to reply in threads, receive reduced ads, and to customize your site experience!

NVIDIA Fixes High-Risk GPU Driver Vulnerabilities That Allow Code Execution and Data Theft

Overclockers is supported by our readers. When you click a link to make a purchase, we may earn a commission. Learn More.

Kenrou

Member
Joined
Aug 14, 2014
"NVIDIA has released urgent security patches addressing eight vulnerabilities in its GPU drivers and virtual GPU software that affect both Windows and Linux systems. The January 16 update targets multiple security flaws that could enable attackers with local access to execute malicious code, steal data, or crash affected systems. Two high-severity vulnerabilities stand out among the patches. The first (CVE-2024-0150) involves a buffer overflow in the GPU display driver that could lead to system compromise through data tampering and information disclosure. The second critical issue (CVE-2024-0146) affects the virtual GPU Manager, where a compromised guest system could trigger memory corruption, potentially leading to code execution and system takeover. For Windows systems, users must update to version 553.62 (R550 branch) or 539.19 (R535 branch). Linux users need to install version 550.144.03 or 535.230.02, depending on their driver branch.

The updates cover NVIDIA's RTX, Quadro, NVS, and Tesla product lines. Enterprise environments using NVIDIA's virtualization technology face additional risks. One vulnerability (CVE-2024-53881) allows guest systems to launch interrupt storms against host machines, potentially causing system-wide outages. To patch these security holes, virtual GPU software users must update to version 17.5 (550.144.02) or 16.9 (535.230.02). The vulnerabilities specifically target systems where attackers have local access, which means remote exploitation is unlikely. However, in virtualized environments where multiple users share GPU resources, these flaws pose a significant security risk. System administrators can download the security updates from NVIDIA's Driver Downloads page, while enterprise vGPU customers should obtain patches through the NVIDIA Licensing Portal. NVIDIA recommends immediate installation of these updates across all affected systems."

 
What I find funny is that most of these flaws (including CPU) are due to buffer overflows and underruns, and the interesting bit is that this happens in drivers older than the 530.** branch, or am I reading this wrong? And I thought my 551.86 was old...
 
Last edited:
The way Nvidia write their page doesn't make it clear how driver branches work. I'm on the latest 566.36, which is presumably on the 565 branch, with the 570 branch expected to support 50 series. Anyway, 566.36 was released 5 December, about 6 weeks ago. I'm guessing the security disclosure was made only recently to give time for the patched drivers to spread and reduce the risk of attacks once published. Note they're only listed as vulnerabilities for now, nothing mentioned about known exploits for them.

In other words, keep updating and don't worry.
 
I'm assuming the Nvidia app update will take care of this? Or does it require a separate download?
 
How the hell do hackers even exploit this? Do I go on a website and it just happens? Download an infected game on Steam?
The latest GeForce driver is still 566.36 though, so it's maybe unrelated to regular desktops?
Anyway take my data just don't take away 400 points of my TimeSpy Extreme score please lolol
 
How the hell do hackers even exploit this? Do I go on a website and it just happens? Download an infected game on Steam?
The latest GeForce driver is still 566.36 though, so it's maybe unrelated to regular desktops?
Anyway take my data just don't take away 400 points of my TimeSpy Extreme score please lolol
could enable attackers with local access to execute malicious code, steal data, or crash affected systems.
Seems you have to allow access to a complete stranger to sit & use your PC after you log in for them.
 
Big servers, company desktops with local net, internet cafes, etc etc etc...
 
Back