First published: Fri Sep 30 2022(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=5.19.12 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41850 is identified as a high-severity vulnerability due to the potential for use-after-free attacks.
To fix CVE-2022-41850, update the Linux kernel to a version that is not affected, such as 5.10.223-1, 5.10.226-1, 6.1.123-1, or any later versions.
CVE-2022-41850 affects versions of the Linux kernel up to and including 5.19.12, as well as Debian Linux version 10.0.
CVE-2022-41850 is a race condition vulnerability that can lead to use-after-free issues.
Yes, CVE-2022-41850 can potentially be exploited remotely under certain conditions involving device report handling.