- NVIDIA releases new GPU driver updates for Windows and Linux
- Fixes 14 vulnerabilities across GeForce, RTX, Quadro, Tesla, NVS, vGPU and Cloud Gaming software
- The most serious flaw, CVE-2026-24187, is a use-after-free flaw rated 8.8/10 that allows code execution, privilege escalation, data theft, or system crash
Nvidia has released a new patch for its GPU display drivers that addresses 14 vulnerabilities in both Windows and Linux.
The majority of the bugs are labeled as “high severity,” which is why Nvidia urged its users to apply the fixes without delay.
In a recently released security advisory, Nvidia said it fixed bugs in the GeForce, RTX, Quadro, Tesla and NVS product lines, as well as its vGPU and Cloud Gaming software.
How to patch
The biggest vulnerability to be fixed is a “use-after-free” memory flaw, now tracked as CVE-2026-24187. With a severity rating of 8.8/10 (high), this flaw allows threat actors to execute arbitrary code, steal data, escalate privileges, and even crash entire systems.
Several other serious vulnerabilities allow malicious actors to do similar things, from code execution to privilege escalation, and from data manipulation to information disclosure.
One affects both Windows and Linux systems through improper access to GPU resources in the kernel layer, while another targets Windows specifically through a timing flaw that could be exploited to manipulate system operations.
Among the bugs fixed are two in Nvidia’s Unified Virtual Memory subsystem on Linux that could lead to denial-of-service attacks without the need for elevated permissions. Nvidia’s vGPU software used in virtualized and cloud environments also received patches for two vulnerabilities in the virtual GPU manager component.
Users can now download the updated drivers either through the Nvidia Driver Downloads page or through the Nvidia Licensing Portal, depending on which products they are running. Windows users should look for driver version 569.49 and above, while those running Linux, version 590.48.01.
In addition to ensuring software is patched, users should also always keep their Windows Defender (or other antivirus programs) up and running at all times.
The company credited several outside security researchers for responsibly reporting the bugs, including researchers from Seoul National University and the Binarly Research Team.

The best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds.



