Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-33981: n/a in n/a

0
Low
VulnerabilityCVE-2022-33981cvecve-2022-33981
Published: Sat Jun 18 2022 (06/18/2022, 15:27:32 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:58:07 UTC

Technical Analysis

CVE-2022-33981 is a vulnerability identified in the Linux kernel, specifically in the floppy disk driver code located in drivers/block/floppy.c, affecting kernel versions prior to 5.17.6. The flaw is a concurrency-related use-after-free issue occurring in the raw_cmd_ioctl function. This function handles ioctl commands related to floppy disk operations. The vulnerability arises because after the raw_cmd object is deallocated, concurrent access can still occur, leading to a use-after-free condition. This can cause a denial of service (DoS) by crashing the kernel or destabilizing the system. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing system crashes. The CVSS v3.1 base score is 3.3, indicating a low severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), and only availability is affected (A:L). There are no known exploits in the wild, and no specific patches or vendor advisories are linked in the provided data. The underlying weakness is classified as CWE-416 (Use After Free). Given the nature of the vulnerability, exploitation requires local access and some level of privilege, which limits the attack surface primarily to users or processes with local system access. The flaw is relevant for systems running affected Linux kernel versions prior to 5.17.6, which may still be in use in some environments, especially in embedded or legacy systems that utilize floppy disk support or related legacy hardware interfaces.

Potential Impact

For European organizations, the impact of CVE-2022-33981 is generally limited due to the low severity and requirement for local access with privileges. However, organizations running Linux systems with kernel versions before 5.17.6 that still have floppy disk driver support enabled could experience denial of service conditions if the vulnerability is triggered. This could lead to system instability or crashes, potentially disrupting critical services or operations. While floppy disk usage is rare in modern enterprise environments, some industrial control systems, legacy infrastructure, or specialized embedded devices in sectors such as manufacturing, transportation, or government may still rely on older Linux kernels with floppy support. In such cases, the vulnerability could be exploited by an insider or attacker who gains local access, causing availability issues. The risk is mitigated by the limited attack vector and the low likelihood of floppy driver usage in typical IT environments. Nonetheless, for organizations with legacy systems, the vulnerability represents a potential vector for denial of service attacks that could impact operational continuity.

Mitigation Recommendations

To mitigate CVE-2022-33981, European organizations should: 1) Identify and inventory Linux systems running kernel versions prior to 5.17.6, especially those with floppy disk driver support enabled. 2) Upgrade affected Linux kernels to version 5.17.6 or later, where the vulnerability is fixed. 3) If upgrading is not immediately feasible, consider disabling the floppy disk driver module (floppy.ko) or blacklisting it to prevent its loading, thereby eliminating the vulnerable code path. 4) Restrict local access to systems, enforcing strict privilege separation and limiting user permissions to reduce the risk of exploitation. 5) Monitor system logs for unusual ioctl calls or kernel crashes related to floppy disk operations. 6) For embedded or legacy devices where kernel upgrades are difficult, evaluate alternative mitigations such as network segmentation and enhanced access controls to reduce exposure. 7) Maintain up-to-date vulnerability management processes to track kernel vulnerabilities and apply patches promptly. These steps go beyond generic advice by focusing on the specific driver and kernel versions, and by recommending disabling the floppy driver where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-06-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc2af

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/6/2025, 11:58:07 PM

Last updated: 2/7/2026, 9:32:47 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats