CVE-2022-33981
Linux Kernel vulnerability analysis and mitigation

Overview

A concurrency use-after-free vulnerability (CVE-2022-33981) was discovered in the Linux kernel's floppy disk driver (drivers/block/floppy.c) before version 5.17.6. The vulnerability exists due to a race condition between raw_cmd_ioctl and seek_interrupt functions, where after deallocating raw_cmd in raw_cmd_ioctl, seek_interrupt still holds the freed raw_cmd and accesses it in floppy_ready or start_motor concurrently (MITRE CVE, Ubuntu Security).

Technical details

The vulnerability occurs in the floppy disk driver's FDRAWCMD ioctl functionality. After deallocating raw_cmd in raw_cmd_ioctl, the seek_interrupt function continues to access the freed memory in floppy_ready or start_motor functions, leading to a use-after-free condition. The issue was discovered by Yuan Ming from Tsinghua University and confirmed through KASAN (Kernel Address Sanitizer) reports (OSS Security).

Impact

The vulnerability could allow a local attacker with access to a floppy drive device to cause a denial of service (system crash or memory corruption) or potentially escalate privileges on the system. The impact is limited to systems with physical floppy drives and where users have access to these devices (Debian Security).

Mitigation and workarounds

The vulnerability was fixed by disabling the FDRAWCMD functionality by default in the Linux kernel. A new configuration option BLK_DEV_FD_RAWCMD was added, which is disabled by default. The fix was implemented in Linux kernel version 5.17.6. System administrators are advised to update to patched kernel versions. For those requiring FDRAWCMD functionality, it can be explicitly enabled through kernel configuration, though this is not recommended for most users (GitHub Linux).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-realtime
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • linux-oracle
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-realtime
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-core
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • kernel
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management