
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-49744) was identified and resolved in the mm/uffd subsystem, specifically related to pte marker handling during fork() operations without fork events (NVD). The issue was discovered through a syzkaller report and was addressed as part of a patch series titled "mm: Fixes on pte markers".
The vulnerability involves incorrect handling of pte markers during fork() operations. Specifically, when fork() occurs, the destination VMA (Virtual Memory Area) is not guaranteed to have VMUFFDWP even if the source may have it and has pte marker installed. The issue stemmed from improper warning implementation along with incorrect comments. The fix involves inheriting the pte marker when needed or keeping the destination pte empty, similar to how the hugetlb implementation handles this in copyhugetlbpage_range() (NVD).
When exploited, this vulnerability could lead to a child process reading a corrupted page. This occurs because the system fails to properly persist a swapin error marker after fork() operations (NVD).
The vulnerability has been patched in the Linux kernel through a series of fixes on pte markers. The solution involves correcting the pte marker inheritance during fork() operations and ensuring proper handling of VMUFFDWP flags (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."