CVE-2022-41850: Linux kernel code execution vulnerability
A security researcher has discovered 3 new code execution vulnerabilities in the Linux kernel that could allow a local or physical attacker to execute code on the affected systems.
The first vulnerability tracked as CVE-2022-41850 (CVSS score: 8.4), is a use-after-free flaw due to a race condition in the roccat_report_event function in drivers/hid/hid-roccat.c. By sending a report while copying a report->value is in progress, a local attacker could exploit this vulnerability to execute arbitrary code on the system. CVE-2022-41850 affects Linux Kernel 5.19.12 and was fixed via this patch.
The second flaw tracked as CVE-2022-41848 (CVSS score: 6.8), is also a use-after-free flaw due to a race condition between mgslpc_ioctl and mgslpc_detach in drivers/char/pcmcia/synclink_cs.c. By removing a PCMCIA device while calling ioctl, an attacker could exploit this vulnerability to execute arbitrary code on the system. The bug affects Linux Kernel 5.19.12 and was fixed via this patch.
The third bug tracks as CVE-2022-41849 (CVSS score: 6.8) is a use-after-free flaw due to a race condition between ufx_ops_open and ufx_usb_disconnect in drivers/video/fbdev/smscufx.c. By removing a USB device while calling open(), a physical attacker could exploit this vulnerability to execute arbitrary code on the system. The bug affects Linux Kernel 5.19.12 and was fixed via this patch.
Administrators are advised to apply the appropriate updates on their Linux distributions as soon as they receive them from their respective distros. They’re also recommended to allow only trusted users to access local systems and always monitor affected systems.