NVIDIA fixes critical flaw in NSIGHT Graphics for Linux

NVIDIA has released an urgent security update to address a high-severity vulnerability in its NSIGHT Graphics tool for Linux systems. The flaw, identified as CVE-2025-33206, could enable attackers to execute arbitrary code if exploited. Affected users are urged to upgrade immediately to mitigate risks.

On January 21, 2026, NVIDIA announced a critical security patch for NSIGHT Graphics for Linux, a tool used in development and graphics workloads. The vulnerability, tracked under CVE-2025-33206, carries a CVSS score of 7.8, classifying it as high severity. It arises from improper input validation in command processing, specifically under CWE-78, where special elements in operating system commands are not neutralized properly.

This flaw allows attackers with local system access to inject malicious inputs, potentially escaping command contexts and executing arbitrary system commands with elevated privileges. Successful exploitation could lead to unauthorized code execution, privilege escalation, data tampering, or denial-of-service attacks. However, triggering the vulnerability requires both local access and user interaction, such as tricking a user into performing a specific action.

The issue poses significant risks to confidentiality, integrity, and availability, particularly in environments handling graphics and development tasks. All versions of NSIGHT Graphics for Linux prior to 2025.5 are affected. NVIDIA recommends upgrading to version 2025.5 or later, available for download from its official developer portal.

In the interim, organizations should limit local access to vulnerable systems and adhere to the principle of least privilege. Further details, including security bulletins and notification subscriptions, can be found on NVIDIA's Product Security page. This update underscores the ongoing need for prompt patching in software development tools to safeguard against evolving threats.

Articoli correlati

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Immagine generata dall'IA

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

Riportato dall'IA Immagine generata dall'IA

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

NVIDIA has launched version 580.119.02 of its graphics driver for Linux, BSD, and Solaris systems. The update addresses several display and compatibility issues reported by users. It serves as the latest recommended production branch for NVIDIA GPU users.

Riportato dall'IA

The GNU C Library has addressed a long-standing security vulnerability that dates back to 1996. This fix, identified as CVE-2026-0915, patches a flaw present in the library since its early versions. The update aims to enhance security for systems relying on this fundamental component of Linux distributions.

Arch Linux users with Pascal GPUs are experiencing widespread boot failures and black screens following the distribution's adoption of Nvidia's 590 series Linux drivers, which ended support for older hardware. Officials recommend legacy drivers as a fix.

Riportato dall'IA

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Offensive Security has released Kali Linux 2025.4, updating its penetration testing platform with improved desktop environments and fresh tools. The version focuses on usability across GNOME, KDE Plasma, and XFCE, while adding support for more devices in Kali NetHunter. It also defaults to Wayland for better compatibility.

Riportato dall'IA

A critical vulnerability in the TLP Linux power management tool has been fixed after researchers discovered it allowed local attackers to bypass authentication and alter system settings. The flaw, identified in version 1.9.0 and tracked as CVE-2025-67859, stemmed from a race condition in the Polkit mechanism. TLP developers released version 1.9.1 on January 7, 2026, addressing the issue following coordinated disclosure.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta