NVIDIA Release High-Severity Graphics Driver Flaws

Home/Security Update/NVIDIA Release High-Severity Graphics Driver Flaws

NVIDIA Release High-Severity Graphics Driver Flaws

In first update of 2021, NVIDIA patched 16 CVEs across its graphics drivers and vGPU software.

NVIDIA Graphics Driver

On Thursday Nvidia, which makes gaming-friendly graphics processing units (GPUs), fixed 16 vulnerabilities flaws affecting its graphics driver.

10 of the vulnerabilities reported impact Nvidia vGPU, six of which relate to the vGPU manager.

This update addresses issues that may lead to denial of service, escalation of privileges, data tampering, or information disclosure.

Importantly, the affected operating systems — Linux, Windows, and for more details find the below table.

Below are the list of vulnerability details:

CVE‑2021‑1051 — High Severity

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which an operation is performed which may lead to denial of service or escalation of privileges.

However, this is considered as most severe vulnerability with base score 8.4

In addition, this flaw can lead to denial of service or privilege escalation. 

Follow Us on: Twitter, InstagramFacebook to get latest security news!

CVE‑2021‑1052 — High Severity

The second highest-severity vulnerability in the driver with the base score 7.8

Moreover, this bug impacts in both Windows and Linux.

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which user-mode clients can access legacy privileged APIs.

As result, it may lead to denial of service, escalation of privileges, and information disclosure.

In addition, Other vulnerabilities with its vulnerability description and base score:

NVIDIA GPU DISPLAY DRIVER

CVE IDDescriptionScore
CVE‑2021‑1053In the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which improper validation of a user pointer may lead to denial of service.6.6
CVE‑2021‑1054In the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action, which may lead to denial of service.6.5
CVE‑2021‑1055In the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which improper access control may lead to denial of service and information disclosure.5.3
CVE‑2021‑1056In the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.5.3

NVIDIA VGPU SOFTWARE

CVE IDDescriptionScore
CVE‑2021‑1057It allows guests to allocate some resources for which the guest is not authorized, which may lead to integrity and confidentiality loss, denial of service, or information disclosure.7.8
CVE‑2021‑1058NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input data size is not validated, which may lead to tampering of data or denial of service.7.8
CVE‑2021‑1059In the vGPU plugin, in which an input index is not validated, which may lead to integer overflow, which in turn may cause tampering of data, information disclosure, or denial of service.7.8
CVE‑2021‑1060In the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service.7.8
CVE‑2021‑1061A race condition may cause the vGPU plugin to continue using a previously validated resource that has since changed, which may lead to denial of service or information disclosure.7.8
CVE‑2021‑1062An input data length is not validated, which may lead to tampering of data or denial of service.7.8
CVE‑2021‑1063An input offset is not validated, which may lead to a buffer overread, which in turn may cause tampering of data, information disclosure, or denial of service.7.8
CVE‑2021‑1064It obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer, which may lead to information disclosure or denial of service.7.8
CVE‑2021‑1065In which input data is not validated, which may lead to tampering of data or denial of service.7.8
CVE‑2021‑1066In which input data is not validated, which may lead to unexpected consumption of resources, which in turn may lead to denial of service.5.5

Stay Protected

Nvidia has recommended that users accept automatic security updates, and visit Security Updates for NVIDIA GPU Display Driveror Security Updates for NVIDIA vGPU Software for the version to install. 

By | 2021-01-08T21:15:11+05:30 January 8th, 2021|Security Update|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!