CVE-2022-42257
Bottlerocket vulnerability analysis and mitigation

Overview

CVE-2022-42257 is a vulnerability discovered in the NVIDIA GPU Display Driver for Linux, specifically affecting the kernel mode layer (nvidia.ko). The vulnerability was disclosed in December 2022 and involves an integer overflow that could potentially lead to information disclosure, data tampering, or denial of service. The vulnerability affects multiple NVIDIA driver branches including R525, R515, R510, R470, R450, and R390 series (NVIDIA Bulletin).

Technical details

The vulnerability is characterized by an integer overflow condition in the kernel mode layer of the NVIDIA GPU driver for Linux. It has been assigned a CVSS v3.1 base score of 5.3 (Medium severity) with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. This indicates that the vulnerability requires local access, low attack complexity, low privileges, and no user interaction to exploit. The potential impact affects confidentiality, integrity, and availability, all at low levels (NVIDIA Bulletin).

Impact

The exploitation of this vulnerability can lead to multiple security implications: information disclosure where sensitive data might be exposed, data tampering allowing unauthorized modification of system data, and denial of service that could affect system availability. The impact is considered moderate as it requires local access and low privileges to exploit (NVIDIA Bulletin).

Mitigation and workarounds

NVIDIA has released security updates to address this vulnerability across multiple driver branches. For Linux systems, the fixed versions are: R525 version 525.60.11, R515 version 515.86.01, R510 version 510.108.03, R470 version 470.161.03, R450 version 450.216.04, and R390 version 390.157. Users are strongly advised to update their NVIDIA GPU drivers to these versions or later to mitigate the vulnerability (NVIDIA Bulletin, Debian LTS).

Additional resources


SourceThis report was generated using AI

Related Bottlerocket vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-45492CRITICAL9.8
  • BottlerocketBottlerocket
  • mozjs60-devel
NoYesAug 30, 2024
CVE-2024-45491CRITICAL9.8
  • BottlerocketBottlerocket
  • xmlrpc-c-client-debuginfo
NoYesAug 30, 2024
CVE-2022-21505MEDIUM6.7
  • NixOSNixOS
  • kernel-zfcpdump-modules-extra
NoYesDec 24, 2024
CVE-2022-28693MEDIUM4.7
  • Linux KernelLinux Kernel
  • kernel-default-extra
NoYesFeb 14, 2025
CVE-2024-45310LOW3.6
  • cAdvisorcAdvisor
  • runc-doc
NoYesSep 03, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management