CVE-2022-0487
Published on: 02/04/2022 12:00:00 AM UTC
Last Modified on: 04/30/2022 02:40:00 AM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.
- CVE-2022-0487 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 2.1 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] [DLA 2941-1] linux-4.19 security update | lists.debian.org text/html |
![]() |
[SECURITY] [DLA 2940-1] linux security update | lists.debian.org text/html |
![]() |
kernel/git/torvalds/linux.git - Linux kernel source tree | git.kernel.org text/html |
![]() |
Debian -- Security Information -- DSA-5095-1 linux | www.debian.org Depreciated Link text/html |
![]() |
2044561 – (CVE-2022-0487) CVE-2022-0487 kernel: Use after free in moxart_remove | bugzilla.redhat.com text/html |
![]() |
Debian -- Security Information -- DSA-5096-1 linux | www.debian.org Depreciated Link text/html |
![]() |
Related QID Numbers
- 159890 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9477)
- 159895 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9478)
- 179115 Debian Security Update for linux (DSA 5095-1)
- 179117 Debian Security Update for linux (DSA 5096-1)
- 179118 Debian Security Update for linux (DLA 2940-1)
- 179119 Debian Security Update for linux-4.19 (DLA 2941-1)
- 376925 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0125)
- 671448 EulerOS Security Update for kernel (EulerOS-SA-2022-1450)
- 671630 EulerOS Security Update for kernel (EulerOS-SA-2022-1647)
- 671631 EulerOS Security Update for kernel (EulerOS-SA-2022-1661)
- 671724 EulerOS Security Update for kernel (EulerOS-SA-2022-1779)
- 751831 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0768-1)
- 751832 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0765-1)
- 751833 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0757-1)
- 751835 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0767-1)
- 751836 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0759-1)
- 751838 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0766-1)
- 751851 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0768-1)
- 751939 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 27 for SLE 12 SP5) (SUSE-SU-2022:1012-1)
- 751952 OpenSUSE Security Update for Linux Kernel (openSUSE-SU-2022:1039-1)
- 751956 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:1037-1)
- 752016 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1039-1)
- 753132 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 2 for SLE 15 SP3) (SUSE-SU-2022:0978-1)
- 753285 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (SUSE-SU-2022:1035-1)
- 753348 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1038-1)
- 753373 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1257-1)
- 753422 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:1037-1)
- 900648 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8494)
- 906160 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8494-1)
Exploit/POC from Github
CVE-2022-0487
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 11.0 | All | All | All |
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Linux | Linux Kernel | All | All | All | All |
Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-0487 : A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_us… twitter.com/i/web/status/1… | 2022-02-04 23:11:39 |
![]() |
Git - CVE-2022-0487: bugzilla.redhat.com/show_bug.cgi?i… | 2022-02-05 02:00:12 |