Categories: Nvidia

Nvidia Warns Gamers to Update Drivers

Nvidia Warns Gamers to Update Drivers

High-severity security issues have been identified in Nvidia drivers.

Nvidia has identified several troubling security issues in graphics card drivers and strongly encourages anyone using one of the company’s GPUs to update their drivers as soon as possible.

According to ThreatPost, there are five driver security bugs, all of which score high on the CVSS Vulnerability Scale.

The most dangerous of the security bugs recognized by Nvidia is CVE-2021-1074, which received a CVSS score of 7.5 out of 10. This bug was found in the Nvidia driver installer, and could allow an attacker with physical access to replace an application resource with malicious files. This would lead to malicious code running, identity theft, and other potential dangers.

Meanwhile, CVE-2021-1075 is another high severity bug (CVSS 7.3) found in the nvlddmkm.sys handler for DxgkDdiEscape. As ThreatPost explains, “The program renames a pointer that contains an invalid memory location, which may result in code execution, denial of service, or privilege escalation.”

CVE-2021-1076 is a medium severity bug found in the Nvidia graphics card display driver for Windows and the Linux kernel where attackers can use incorrect access controls to launch denial of service attacks, steal information, or corrupt data.

CVE-2021-1077 is a medium risk for Windows and Linux drivers, where the driver “uses a link count to manage an incorrectly updated resource, which can lead to a denial of service.”

There is another medium severity bug, CVE-2021-1078, which was found in all versions of Nvidia drivers for Windows and again allows the impact on the system kernel – this time respecting a null pointer can crash the computer.

If that’s not enough for you, Nvidia has also identified eight software vulnerabilities in its vGPU software – and they affect AI-enabled workstations and workloads, each vulnerabilities have a medium or high severity level.

WHAT SHOULD YOU DO?

Nvidia hastily released a driver update to fix these vulnerabilities, they should be installed as soon as possible, you can take advantage of this Nvidia driver download pageor through the GeForce Experience app if you have it installed.

Check out our guide to updating and installing the latest Nvidia drivers if you need more help.

The number and severity of these security bugs is certainly a concern, but we have reached out to Nvidia for comment.

These are the best laptops of 2021.

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420