Vulnerability Description
drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 5.19.12 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/cVendor Advisory
- https://lore.kernel.org/lkml/20220919040251.GA302541%40ubuntu/T/#rc85e751f467b3e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/cVendor Advisory
- https://lore.kernel.org/lkml/20220919040251.GA302541%40ubuntu/T/#rc85e751f467b3e
FAQ
What is CVE-2022-41848?
CVE-2022-41848 is a vulnerability with a CVSS score of 4.2 (MEDIUM). drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, ...
How severe is CVE-2022-41848?
CVE-2022-41848 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41848?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.