• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs

You are here: Home / Latest Cyber Security Vulnerabilities / NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs

The corporation also issued patches for Tesla-based mostly GPUs as section of an up-to-date, independent security advisory.

NVIDIA has newly disclosed three security vulnerabilities in the NVIDIA Shield Television set, which could permit denial of services, escalation of privileges and facts decline.

The NVIDIA Defend Tv set is a established-prime gadget that acts as a hub for the intelligent house, streams Pc online games from a gaming Pc to a Television and lets nearby and on line media playback and streaming. Android game titles suitable with Android Tv set are suitable with the Shield Television set and controller, as are all those from the NVIDIA’s GeoForce market.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Acronis True Image 2021

Protect and backup your data using Acronis True Image. Acronis is made in Germany and is a leading brand in IT back up and secirity for years. Acronis True Image take secure and enxrypted backups from your Wdindows and macOS. With Acronis True image you will never be worried about Ransomware attacks and virus infections.

Get Acronis with 50% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Independently, NVIDIA issued an updated security advisory for a cluster of security bugs in NVIDIA’s online video-welcoming graphics processing device (GPU) Display screen Driver. These could plague Linux avid gamers and other individuals with denial of assistance, escalation of privileges and facts disclosure.

NVIDIA Shield Television Bugs

When it comes to the internet-of-things (IoT) unit regarded as Defend Television set, 1 large-severity bug (CVE‑2021‑1068) exists in the NVDEC element of the gadget, which is a hardware-dependent decoder. It occurs due to the fact an attacker can go through from or write to a memory locale that is outdoors the intended boundary of the buffer, which could guide to denial of services or escalation of privileges. It carries a 7.8 CVSS rating.

The other two bugs are medium-severity. The flaw tracked as CVE‑2021‑1069 exists in the NVHost functionality, and could lead to an irregular reboot due to a null pointer reference, leading to information loss.

An additional, CVE‑2021‑1067 exists in the implementation of the RPMB command standing, in which an attacker can generate to the Produce Secure Configuration Block, which could direct to denial of services or escalation of privileges.

To guard a procedure, buyers can down load and put in a computer software update by means of the update notification that will look on the Dwelling Screen, or by going to Settings>About>System update.

NVIDIA GPU Show Driver Kernel Bugs

Before in January, Nvidia patched flaws tied to 16 CVEs throughout its graphics drivers and vGPU computer software, in its initial security update of 2021. An up-to-date security advisory now consists of the availability of patched Linux drivers for the Tesla line of GPUs, affecting CVE-2021-1052, CVE-2021-1053 and CVE-2021-1056.

Tesla as a line of GPU accelerator boards optimized for superior-efficiency, normal-objective computing. They are applied for parallel scientific, engineering, and technological computing, and they are made for deployment in supercomputers, clusters and workstations.

The patches deal with just one large-severity issue (CVE‑2021‑1052) in the graphics driver, which is the software ingredient that allows a device’s functioning procedure and systems to use NVIDIA’s large-level, gaming- and science-optimized graphics hardware.

uncovered in the Linux kernel manner layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL. Right here, “user-mode clients can obtain legacy privileged APIs, which may possibly lead to denial of assistance, escalation of privileges and information disclosure,” in accordance to the enterprise.

The other two Linux issues fee medium-severity. The first (CVE‑2021‑1053) also influences the kernel manner layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL, in which poor validation of a person pointer may well guide to denial of support.

The next medium bug (CVE‑2021‑1056) is a vulnerability in the kernel manner layer (nvidia.ko) in which it does not wholly honor working program file process permissions to present GPU device-degree isolation, which may direct to denial of services or information disclosure.

Total aspects on all of the GPU vulnerabilities are obtainable in the security bulletin. Patched variations are as follows:

NVIDIA’s Line of Security Bugs

This is not NVIDIA’s 1st patching rodeo.

Previous year, the organization issued its honest share of patches together with fixes for two high-severity flaws in the Windows version of its GeForce Knowledge software package, and a patch for a critical bug in its high-functionality line of DGX servers, both in Oct and a superior-severity flaw in its GeForce NOW application application for Windows in November.

Down load our special Totally free Threatpost Insider Book Healthcare Security Woes Balloon in a Covid-Period Environment , sponsored by ZeroNorth, to learn a lot more about what these security hazards imply for hospitals at the working day-to-working day amount and how healthcare security groups can implement greatest techniques to protect companies and patients. Get the full tale and Obtain the E-book now – on us!

 

 


Some elements of this write-up are sourced from:
threatpost.com

Previous Post: «Cyber Security News Trump Pardons Google Trade Secret Thief

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs
  • Trump Pardons Google Trade Secret Thief
  • US Marines Create “Blue Team”
  • Malwarebytes Hit by SolarWinds Attackers
  • Biden nominees highlight tough cyber security challenges
  • Panel Reflects on How Orgs Should Approach Security in 2021
  • Report: Security staff excluded from app development
  • Google Research Pinpoints Security Soft Spot in Multiple Chat Platforms
  • #Inauguration2021: Cyber-Experts React as Joe Biden Set to Become 46th US President
  • With all eyes on the inauguration, preemptive digital security takes center stage again

Copyright © TheCyberSecurity.News, All Rights Reserved.