Nvidia patches 12 serious security flaws — what to do right now
This dirty dozen of security flaws needs to be zapped right away
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
Nvidia wants you to patch your graphics-card drivers, because there are 12 serious security vulnerabilities affecting Nvidia software for Windows and Linux.
The flaws "may lead to denial of service, escalation of privileges, or information disclosure," according to an Nvidia security bulletin posted yesterday (June 24). "Code execution" gets mentioned too.
- Our list of the best gaming PCs
- Nvidia GeForce RTX 3080 benchmarks leaked — AMD should worry
- New: Steam Summer Sale 2020 is live — the best deals so far
In other words, the Nvidia software could just stop working, or could be exploited by malware already on the machine to gain administrative privileges, steal personal or sensitive information or run even more malware.
However, the vulnerabilities cannot be exploited from outside your local network, so an attacker would need to be at or close to your machine to use any of the flaws.
Five of the flaws affect the Nvidia GeForce software for Windows, which needs to be updated to version 451.48. Linux GeForce software is affected by two vulnerabilities, one of which is among the Windows five; Linux software needs to be updated to version 450.51. The same vulnerabilities affect the professional Quadro, NVS and Tesla drivers.
The other six flaws affect Nvidia's virtual GPU software for virtual machines in enterprise environments.
To update your drivers, simply make sure you're logged in as a system administrator (the default on both Windows and most versions of Linux), open the GeForce interface and click on the Drivers button on the upper left. Some Linux distributions may package the driver updates with regular software updates.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Alternately, you can go to Nvidia's Driver Downloads page and plug in your product and system information to manually download and install the driver.
This is a bigger batch of flaws than the previous Nvidia security updates, which involved two vulnerabilities back in March 2020.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.
