CVE-2022-50014
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's memory management, specifically the handling of forced copy-on-write (FOLL_FORCE) operations. Due to a flaw, unprivileged user space processes could exploit race conditions to modify read-only mapped shared pages, such as tmpfs/shmem files, even without write permissions. This could allow unauthorized modification of file contents and bypass certain write protections. The issue stems from improper handling of page table entries (PTEs) marked dirty and the logic around copy-on-write mappings. The fix removes the problematic FOLL_COW logic and relies on more accurate checks to prevent unauthorized write access.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an unprivileged user to modify files they should only have read access to, potentially leading to unauthorized data modification or corruption. This could undermine system security by allowing bypass of memory write protections and sealing mechanisms, possibly affecting applications relying on these protections, such as those using RDMA or debugging tools.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for CVE-2022-50014. The fix involves changes to the mm/gup subsystem removing FOLL_COW and correcting handling of FOLL_FORCE to prevent unauthorized write access. If updating is not immediately possible, consider reverting the problematic commit if your kernel version is before 5.19, as a temporary measure. Also, restrict unprivileged user access to tmpfs/shmem files and monitor applications that use FOLL_FORCE, such as those pinning pages via RDMA, to reduce risk.