Skip to main content

CVE-2022-31615: CWE-476 NULL Pointer Dereference in NVIDIA GeForce, Workstation, Compute

Medium
VulnerabilityCVE-2022-31615cvecve-2022-31615cwe-476
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: NVIDIA
Product: GeForce, Workstation, Compute

Description

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service.

AI-Powered Analysis

AILast updated: 06/24/2025, 23:52:15 UTC

Technical Analysis

CVE-2022-31615 is a vulnerability identified in the NVIDIA GPU Display Driver for Linux, specifically affecting the kernel mode layer of the driver. The flaw is a NULL pointer dereference (CWE-476), which occurs when a local user with limited privileges triggers a condition that causes the driver to dereference a null pointer. This results in a denial of service (DoS) condition by crashing the kernel mode driver component, potentially leading to system instability or a forced reboot. The vulnerability affects all versions of NVIDIA GeForce, Workstation, and Compute drivers for Linux released prior to the August 2022 update. Exploitation requires local access with low privileges (PR:L), no user interaction is needed (UI:N), and the attack vector is local (AV:L). The vulnerability does not impact confidentiality or integrity but solely affects availability, as it causes a crash or system hang. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits have been reported in the wild to date. The vulnerability is mitigated by updating to the August 2022 or later driver releases from NVIDIA. Since the flaw resides in the kernel mode layer of the GPU driver, it can impact any Linux system using vulnerable NVIDIA GPUs, including desktops, workstations, and compute servers that rely on NVIDIA hardware for graphics or GPU-accelerated workloads.

Potential Impact

For European organizations, the primary impact of CVE-2022-31615 is the potential for denial of service on Linux systems equipped with vulnerable NVIDIA GPUs. This can disrupt critical operations in environments relying on GPU acceleration, such as scientific research institutions, financial services using GPU compute for analytics, media and entertainment companies performing rendering tasks, and data centers running AI/ML workloads. The DoS condition could lead to system crashes or reboots, causing downtime and potential loss of productivity. While the vulnerability does not allow privilege escalation or data compromise, the availability impact can be significant in high-availability or real-time processing environments. Organizations with Linux-based infrastructure and NVIDIA GPUs must consider the risk of local users triggering this flaw, which could be exploited by malicious insiders or through compromised user accounts. The lack of known exploits reduces immediate risk, but the medium severity score and kernel-level impact warrant prompt remediation to maintain operational stability.

Mitigation Recommendations

Apply the NVIDIA GPU driver update released in August 2022 or later, which addresses this vulnerability. Ensure all Linux systems with NVIDIA GeForce, Workstation, or Compute GPUs are updated promptly. Implement strict access controls and user privilege management to limit local user capabilities, reducing the risk of exploitation by unauthorized or untrusted users. Monitor system logs and kernel crash reports for signs of null pointer dereference or GPU driver crashes to detect potential exploitation attempts or instability. In multi-user environments, consider isolating GPU resources or restricting GPU access to trusted users and processes to minimize exposure. For critical systems, implement redundancy and failover mechanisms to mitigate the impact of potential DoS conditions caused by this vulnerability. Regularly audit and update GPU drivers as part of the organization's patch management process to ensure timely remediation of vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
nvidia
Date Reserved
2022-05-24T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeee68

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/24/2025, 11:52:15 PM

Last updated: 8/16/2025, 2:12:46 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats