{"id":147668,"date":"2022-10-06T19:24:53","date_gmt":"2022-10-07T00:24:53","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/10\/3-critical-malicious-code-execution-vulnerabilities-in-linux-kernel"},"modified":"2022-10-06T19:24:53","modified_gmt":"2022-10-07T00:24:53","slug":"3-critical-malicious-code-execution-vulnerabilities-in-linux-kernel","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/10\/3-critical-malicious-code-execution-vulnerabilities-in-linux-kernel","title":{"rendered":"3 critical malicious code execution vulnerabilities in Linux kernel"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/-plvKXjb_CY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerable computers and run arbitrary code. The roccat_report_event function in drivers\/hid\/hid-roccat.c has a use-after-free vulnerability identified as CVE-2022\u201341850 (CVSS score: 8.4). A local attacker might exploit this flaw to run malicious script on the system by submitting a report while copying a report-&gt;value. Patch has be released to addresses the Linux Kernel 5.19.12 vulnerability CVE-2022\u201341850.<\/p>\n<p>The second flaw tracked as CVE-2022\u201341848 (CVSS score: 6.8), is also a use-after-free flaw due to a race condition between <em>mgslpc_ioctl<\/em> and <em>mgslpc_detach in drivers\/char\/pcmcia\/synclink_cs.c<\/em>. By removing a PCMCIA device while calling ioctl, an attacker could exploit this vulnerability to execute arbitrary code on the system. The bug affects Linux Kernel 5.19.12 and was fixed via <a href=\"https:\/\/lore.kernel.org\/lkml\/20220919040251.GA302541@ubuntu\/T\/\" target=\"_blank\" rel=\"noreferrer noopener\">this patch<\/a>.<\/p>\n<p>Due to a compatibility issues between mgslpc ioctl and mgslpc detach in drivers\/char\/pcmcia\/synclink cs.c, the second vulnerability, tagged as CVE-2022\u201341848 (CVSS score: 6.8), is likewise a use-after-free <a href=\"https:\/\/www.securitynewspaper.com\/2022\/09\/13\/critical-flaw-cve-2022-2964-with-cvss-score-7-8-affects-linux-kernel-and-allows-arbitrary-code-execution\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability<\/a>. An adversary might use this flaw to run malicious script on the computer by deleting a PCMCIA device while executing ioctl. There is a patch that corrects this flaw that was present in the Linux Kernel 5.19.12.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerable computers and run arbitrary code. The roccat_report_event function in drivers\/hid\/hid-roccat.c has a use-after-free vulnerability identified as CVE-2022\u201341850 (CVSS score: 8.4). A local attacker might exploit [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1492],"tags":[],"class_list":["post-147668","post","type-post","status-publish","format-standard","hentry","category-computing","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=147668"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147668\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=147668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=147668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=147668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}