"Nvidia has released a software security update for the Nvidia GPU display driver".
Patches that plug the flaws are available now for all cards except the Tesla R418 versions and the Quadro and NVS with the R400 build; drivers for those will come out 12 August and 19 August, respectively. These scores range from 5.2 to 8.8.
Nvidia warns that the flaws in its GPU driver collectively could allow local attackers to execute code, cause a denial of service or escalate privileges.
All five of the bugs require local access to exploit and attacks can not be carried out remotely.
Nvidia GeForce, Quadro and Tesla graphics cards are all affected by a total of five risky security exploits, which can potentially allow attackers to perform local code execution, denial of service or escalation of privileges.
According to Tech Radar, these exploits would require the attacker to have local access to your system, so unless you're working in, say, a co-working space or even your own office space, you're in danger of being a victim. This behavior may lead to code execution, denial of service, or escalation of privileges.
CVE-2019-5686: "NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service". As a precaution, you should go ahead and install the latest driver package for your GPU. You will see some fixed GPU drivers are still being worked upon.
For those with OEM graphics hardware which is supported by their PC manufacturer, the security fixes are included in driver releases 431.23, 425.85, and 412.39. You can try installing Nvidia's more generic drivers - especially if your laptop's manufacturer hasn't updated their versions for the previous year or so - but I recommend backing up your system in case these drivers go haywire and you have to roll back.