Vulnerability Name: | CVE-2022-41848 (CCN-237593) | ||||||||||||||||||||||||
Assigned: | 2022-09-20 | ||||||||||||||||||||||||
Published: | 2022-09-20 | ||||||||||||||||||||||||
Updated: | 2022-10-04 | ||||||||||||||||||||||||
Summary: | drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach. | ||||||||||||||||||||||||
CVSS v3 Severity: | 4.2 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.7 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-362 CWE-416 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-41848 Source: XF Type: UNKNOWN linux-kernel-cve202241848-code-exec(237593) Source: MISC Type: Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/char/pcmcia/synclink_cs.c Source: CCN Type: Lore Kernel Web site Re: [PATCH v5] char: pcmcia: synclink_cs: Fix use-after-free in mgslpc_ops Source: MISC Type: Mailing List, Patch, Vendor Advisory https://lore.kernel.org/lkml/20220919040251.GA302541@ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |