Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-2590
HistoryAug 08, 2022 - 12:00 a.m.

CVE-2022-2590

2022-08-0800:00:00
ubuntu.com
ubuntu.com
103

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.3%

A race condition was found in the way the Linux kernel’s memory subsystem
handled the copy-on-write (COW) breakage of private read-only shared memory
mappings. This flaw allows an unprivileged, local user to gain write access
to read-only memory mappings, increasing their privileges on the system.

Notes

Author Note
sbeattie introduced in 9ae0f87d009c (“mm/shmem: unconditionally set pte dirty in mfill_atomic_install_pte”) (v5.16) from reporter: "Kernels before extended uffd-wp support and before PageAnonExclusive (< 5.19) can simply revert 9ae0f87d009c instead and be safe regarding UFFDIO_CONTINUE.
OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchlinux-oem-5.17< 5.17.0-1031.32UNKNOWN

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.3%