CVE-2022-2590
Linux Debian vulnerability analysis and mitigation

Overview

A race condition vulnerability (CVE-2022-2590) was discovered in the Linux kernel's memory subsystem, specifically in how it handles the copy-on-write (COW) breakage of private read-only shared memory mappings. The vulnerability was found by David Hildenbrand and disclosed on August 8, 2022. This issue affects Linux kernel versions >= v5.16 on x86-64 and aarch64 architectures when compiled with CONFIG_USERFAULTFD=y (Openwall).

Technical details

The vulnerability stems from a race condition in the memory manager where an unprivileged user can modify file content of a shmem (tmpfs) file, even without write permissions. The issue was introduced by commit 9ae0f87d009c ("mm/shmem: unconditionally set pte dirty in mfillatomicinstallpte"). The vulnerability allows attackers to use UFFDIOCONTINUE to map a shmem page R/O while marking the pte dirty, similar to the Dirty COW vulnerability (CVE-2016-5195) but restricted to shared memory (shmem/tmpfs) (Kernel Archive).

Impact

The vulnerability enables local, unprivileged attackers to gain write access to read-only memory mappings, potentially leading to privilege escalation. Attackers can modify any running process that is readable, and even if the process is not readable, they can use cat /proc/{pid}/maps to find readable ELF modules. On Android, attackers can dynamically modify an Android Runtime (ART) process, potentially gaining root access without causing crashes or requiring device reboots (Security Online).

Mitigation and workarounds

For Linux versions < v5.19, the mitigation involves reverting the problematic commit (9ae0f87d009c). For Linux >= v5.19, a fix was proposed that addresses the security issue by modifying how FOLL_FORCE handles COW mappings. Users are advised to upgrade to the latest Linux kernel versions that include the security patches (Openwall).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67726HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-67725HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-11266MEDIUM6.8
  • Linux DebianLinux Debian
  • gdcm
NoNoDec 12, 2025
CVE-2025-67749MEDIUM5.3
  • Linux DebianLinux Debian
  • pcsx2
NoNoDec 12, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management