Accueil / Actualités / Composants / Cartes graphiques / Les GeForce 473.81 WHQL débarquent, Nvidia colmatage des failles de sécurité
Pilotes graphiques Nvidia GeForce 473.81 WHQL – Mise à jour de sécurité
Pilotes graphiques Nvidia GeForce 473.81 WHQL – Mise à jour de sécurité

Les GeForce 473.81 WHQL débarquent, Nvidia colmatage des failles de sécurité

Nvidia a officiellement annoncé l’abandon des systèmes d’exploitation Windows 7, 8 et 8.1 en 2021. Cependant la firme a promis qu’elle publierait des mises à jour de sécurité en cas de bugs critiques jusqu’en septembre 2024.

Dans ce contexte, de nouveaux pilotes graphiques viennent de voir le jour. Ces GeForce 473.81 WHQL visent les PC sous Windows 7, Windows 8 ou Windows 8.1. Nous avons uniquement et seulement des modifications et des améliorations liées à la sécurité. Il n’y a aucune nouveauté et optimisation de performance.

La note de version liste les différents problèmes de sécurité corrigés. Ils concernent les pilotes d’affichage GPU et le logiciel VGPU. L’indice de gravité est « élevé ». Voici le CVE de ces différentes failles

  • CVE-2022-31606,
  • CVE-2022-31607,
  • CVE-2022-31608,
  • CVE-2022-31610,
  • CVE-2022-31617,
  • CVE-2022-31612,
  • CVE-2022-31613,
  • CVE-2022-31609,
  • CVE-2022-31614,
  • CVE-2022-31618,
  • CVE-2022-34665,
  • CVE-2022-31616,
  • CVE-2022-31615.

Tous les détails sont disponibles en fin d’article ainsi que le lien de téléchargement. A noter que les vulnérabilités les plus problématiques peuvent entraîner

  • un déni de service,
  • la divulgation d’informations,
  • une escalade des privilèges,
  • la falsification des données.

Il est fortement recommandé de procéder à une mise à jour de ses pilotes si vous utilisez l’un de ces systèmes d’exploitation.

GeForce 473.81 WHQL, note de version et lien

  • Information
  • Note de version
  • Produit pris en charge
  • Téléchargement
Version: 473.81 WHQL
Date de réalisation: 2 aout 2022
Système d’exploitation: Windows 7, Windows 8 et 8.1
Langue: Français / Anglais
Taille: 593.15

Details

This section provides a summary of potential vulnerabilities that this security update addresses and their impact. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.

NVIDIA GPU Display Driver

CVE IDs Description
CVE‑2022‑31606 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.
CVE‑2022‑31607 NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure.
CVE‑2022‑31608 NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file,
where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
CVE‑2022‑31610 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys),
where a local user with basic capabilities can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
CVE‑2022‑31617 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys),
where a local user with basic capabilities can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
CVE‑2022‑31612 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to a system crash or a leak of internal kernel information.
CVE‑2022‑31613 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where any local user can cause a null-pointer dereference, which may lead to a kernel panic.
CVE‑2022‑34665 NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
CVE‑2022‑34666 NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer,
where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.
CVE‑2022‑31616 NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to denial of service, or information disclosure.
CVE‑2022‑31615 NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.

NVIDIA vGPU Software

CVE IDs Description
CVE‑2022‑31609 NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.
CVE‑2022‑31614 NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) where it may double-free some resources. An attacker may exploit this vulnerability with other vulnerabilities to cause denial of service, code execution, and information disclosure.
CVE‑2022‑31618 NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a null pointer, which may lead to denial of service.

The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.

Série NVIDIA TITAN :

NVIDIA TITAN RTX, NVIDIA TITAN V

GeForce RTX série 30 :

GeForce RTX 3090 Ti, GeForce RTX 3090, GeForce RTX 3080 Ti, GeForce RTX 3080, GeForce RTX 3070 Ti, GeForce RTX 3070, GeForce RTX 3060 Ti, GeForce RTX 3060, GeForce RTX 3050

GeForce RTX série 20 :

GeForce RTX 2080 Ti, GeForce RTX 2080 SUPER, GeForce RTX 2080, GeForce RTX 2070 SUPER, GeForce RTX 2070, GeForce RTX 2060 SUPER, GeForce RTX 2060

Série GeForce 16 :

GeForce GTX 1660 SUPER, GeForce GTX 1650 SUPER, GeForce GTX 1660 Ti, GeForce GTX 1660, GeForce GTX 1650, GeForce GTX 1630

Lien de téléchargement : Pilotes graphiques GeForce

Laisser une réponse

Votre adresse email ne sera pas publiéeLes champs requis sont surlignés *

*