CVE-2022-48689: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tcp: TX zerocopy should not sense pfmemalloc status We got a recent syzbot report [1] showing a possible misuse of pfmemalloc page status in TCP zerocopy paths. Indeed, for pages coming from user space or other layers, using page_is_pfmemalloc() is moot, and possibly could give false positives. There has been attempts to make page_is_pfmemalloc() more robust, but not using it in the first place in this context is probably better, removing cpu cycles. Note to stable teams : You need to backport 84ce071e38a6 ("net: introduce __skb_fill_page_desc_noacc") as a prereq. Race is more probable after commit c07aea3ef4d4 ("mm: add a signature in struct page") because page_is_pfmemalloc() is now using low order bit from page->lru.next, which can change more often than page->index. Low order bit should never be set for lru.next (when used as an anchor in LRU list), so KCSAN report is mostly a false positive. Backporting to older kernel versions seems not necessary. [1] BUG: KCSAN: data-race in lru_add_fn / tcp_build_frag write to 0xffffea0004a1d2c8 of 8 bytes by task 18600 on cpu 0: __list_add include/linux/list.h:73 [inline] list_add include/linux/list.h:88 [inline] lruvec_add_folio include/linux/mm_inline.h:105 [inline] lru_add_fn+0x440/0x520 mm/swap.c:228 folio_batch_move_lru+0x1e1/0x2a0 mm/swap.c:246 folio_batch_add_and_move mm/swap.c:263 [inline] folio_add_lru+0xf1/0x140 mm/swap.c:490 filemap_add_folio+0xf8/0x150 mm/filemap.c:948 __filemap_get_folio+0x510/0x6d0 mm/filemap.c:1981 pagecache_get_page+0x26/0x190 mm/folio-compat.c:104 grab_cache_page_write_begin+0x2a/0x30 mm/folio-compat.c:116 ext4_da_write_begin+0x2dd/0x5f0 fs/ext4/inode.c:2988 generic_perform_write+0x1d4/0x3f0 mm/filemap.c:3738 ext4_buffered_write_iter+0x235/0x3e0 fs/ext4/file.c:270 ext4_file_write_iter+0x2e3/0x1210 call_write_iter include/linux/fs.h:2187 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x468/0x760 fs/read_write.c:578 ksys_write+0xe8/0x1a0 fs/read_write.c:631 __do_sys_write fs/read_write.c:643 [inline] __se_sys_write fs/read_write.c:640 [inline] __x64_sys_write+0x3e/0x50 fs/read_write.c:640 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffea0004a1d2c8 of 8 bytes by task 18611 on cpu 1: page_is_pfmemalloc include/linux/mm.h:1740 [inline] __skb_fill_page_desc include/linux/skbuff.h:2422 [inline] skb_fill_page_desc include/linux/skbuff.h:2443 [inline] tcp_build_frag+0x613/0xb20 net/ipv4/tcp.c:1018 do_tcp_sendpages+0x3e8/0xaf0 net/ipv4/tcp.c:1075 tcp_sendpage_locked net/ipv4/tcp.c:1140 [inline] tcp_sendpage+0x89/0xb0 net/ipv4/tcp.c:1150 inet_sendpage+0x7f/0xc0 net/ipv4/af_inet.c:833 kernel_sendpage+0x184/0x300 net/socket.c:3561 sock_sendpage+0x5a/0x70 net/socket.c:1054 pipe_to_sendpage+0x128/0x160 fs/splice.c:361 splice_from_pipe_feed fs/splice.c:415 [inline] __splice_from_pipe+0x222/0x4d0 fs/splice.c:559 splice_from_pipe fs/splice.c:594 [inline] generic_splice_sendpage+0x89/0xc0 fs/splice.c:743 do_splice_from fs/splice.c:764 [inline] direct_splice_actor+0x80/0xa0 fs/splice.c:931 splice_direct_to_actor+0x305/0x620 fs/splice.c:886 do_splice_direct+0xfb/0x180 fs/splice.c:974 do_sendfile+0x3bf/0x910 fs/read_write.c:1249 __do_sys_sendfile64 fs/read_write.c:1317 [inline] __se_sys_sendfile64 fs/read_write.c:1303 [inline] __x64_sys_sendfile64+0x10c/0x150 fs/read_write.c:1303 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x0000000000000000 -> 0xffffea0004a1d288 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
AI Analysis
Technical Summary
CVE-2022-48689 is a medium severity vulnerability in the Linux kernel affecting the TCP zerocopy implementation. The issue arises from improper handling of the pfmemalloc page status in TCP zerocopy paths. Specifically, the kernel code incorrectly uses the page_is_pfmemalloc() function to check the pfmemalloc status of pages involved in TCP zerocopy operations. This function is intended to detect pages allocated under memory pressure conditions to avoid deadlocks, but its use in this context is inappropriate because pages coming from user space or other layers do not reliably reflect pfmemalloc status. This misuse can lead to false positives and unnecessary CPU cycles, but more critically, it introduces a data race condition as reported by Kernel Concurrency Sanitizer (KCSAN). The race condition occurs due to concurrent access and modification of linked list pointers in the Linux memory management subsystem, particularly involving the lru.next field in struct page, which was changed in a recent kernel commit to include a signature bit. The race can cause inconsistent or corrupted memory state during TCP sendpage operations, potentially leading to system instability or crashes. The vulnerability was identified through syzbot fuzzing and KCSAN reports and has been addressed by removing the pfmemalloc check in the TCP zerocopy path and introducing a prerequisite patch (__skb_fill_page_desc_noacc) to stabilize page descriptor handling. The vulnerability affects kernel versions including and after commit c07aea3ef4d4, but backporting to older kernels is not deemed necessary. Exploitation requires local privileges with low complexity, no user interaction, and can impact confidentiality, integrity, and availability to a limited extent, reflected in a CVSS score of 5.3 (medium severity). No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to servers and infrastructure running vulnerable Linux kernel versions, especially those handling high-performance networking workloads using TCP zerocopy for efficient data transfer. Potential impacts include system crashes or instability due to memory corruption, which can lead to denial of service conditions. While direct data leakage or privilege escalation is not explicitly reported, the data race and memory corruption could be leveraged in complex attack chains. Organizations relying on Linux-based servers for critical services such as web hosting, cloud infrastructure, or telecommunications could experience service disruptions. Given the medium severity and local privilege requirement, the threat is more significant for environments where untrusted users or processes have local access, such as multi-tenant cloud platforms or shared hosting providers. The absence of known exploits reduces immediate risk but patching is important to prevent future exploitation. The vulnerability also affects kernel versions commonly used in enterprise Linux distributions, which are widespread across Europe.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to those including the patch that removes the pfmemalloc check in TCP zerocopy paths and introduces __skb_fill_page_desc_noacc. Specifically, kernel versions incorporating commit 84ce071e38a6 and later should be deployed. For environments where immediate kernel upgrades are challenging, organizations should restrict local access to trusted users only, minimizing the risk of local exploitation. Monitoring kernel logs for anomalies related to TCP sendpage or memory management errors can help detect exploitation attempts. Additionally, organizations should review and harden container and virtualization environments to limit local privilege escalation vectors. Network segmentation and strict access controls can reduce exposure of vulnerable systems. Finally, coordinating with Linux distribution vendors to receive timely security updates and backports is critical to maintain secure kernel versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-48689: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tcp: TX zerocopy should not sense pfmemalloc status We got a recent syzbot report [1] showing a possible misuse of pfmemalloc page status in TCP zerocopy paths. Indeed, for pages coming from user space or other layers, using page_is_pfmemalloc() is moot, and possibly could give false positives. There has been attempts to make page_is_pfmemalloc() more robust, but not using it in the first place in this context is probably better, removing cpu cycles. Note to stable teams : You need to backport 84ce071e38a6 ("net: introduce __skb_fill_page_desc_noacc") as a prereq. Race is more probable after commit c07aea3ef4d4 ("mm: add a signature in struct page") because page_is_pfmemalloc() is now using low order bit from page->lru.next, which can change more often than page->index. Low order bit should never be set for lru.next (when used as an anchor in LRU list), so KCSAN report is mostly a false positive. Backporting to older kernel versions seems not necessary. [1] BUG: KCSAN: data-race in lru_add_fn / tcp_build_frag write to 0xffffea0004a1d2c8 of 8 bytes by task 18600 on cpu 0: __list_add include/linux/list.h:73 [inline] list_add include/linux/list.h:88 [inline] lruvec_add_folio include/linux/mm_inline.h:105 [inline] lru_add_fn+0x440/0x520 mm/swap.c:228 folio_batch_move_lru+0x1e1/0x2a0 mm/swap.c:246 folio_batch_add_and_move mm/swap.c:263 [inline] folio_add_lru+0xf1/0x140 mm/swap.c:490 filemap_add_folio+0xf8/0x150 mm/filemap.c:948 __filemap_get_folio+0x510/0x6d0 mm/filemap.c:1981 pagecache_get_page+0x26/0x190 mm/folio-compat.c:104 grab_cache_page_write_begin+0x2a/0x30 mm/folio-compat.c:116 ext4_da_write_begin+0x2dd/0x5f0 fs/ext4/inode.c:2988 generic_perform_write+0x1d4/0x3f0 mm/filemap.c:3738 ext4_buffered_write_iter+0x235/0x3e0 fs/ext4/file.c:270 ext4_file_write_iter+0x2e3/0x1210 call_write_iter include/linux/fs.h:2187 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x468/0x760 fs/read_write.c:578 ksys_write+0xe8/0x1a0 fs/read_write.c:631 __do_sys_write fs/read_write.c:643 [inline] __se_sys_write fs/read_write.c:640 [inline] __x64_sys_write+0x3e/0x50 fs/read_write.c:640 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffea0004a1d2c8 of 8 bytes by task 18611 on cpu 1: page_is_pfmemalloc include/linux/mm.h:1740 [inline] __skb_fill_page_desc include/linux/skbuff.h:2422 [inline] skb_fill_page_desc include/linux/skbuff.h:2443 [inline] tcp_build_frag+0x613/0xb20 net/ipv4/tcp.c:1018 do_tcp_sendpages+0x3e8/0xaf0 net/ipv4/tcp.c:1075 tcp_sendpage_locked net/ipv4/tcp.c:1140 [inline] tcp_sendpage+0x89/0xb0 net/ipv4/tcp.c:1150 inet_sendpage+0x7f/0xc0 net/ipv4/af_inet.c:833 kernel_sendpage+0x184/0x300 net/socket.c:3561 sock_sendpage+0x5a/0x70 net/socket.c:1054 pipe_to_sendpage+0x128/0x160 fs/splice.c:361 splice_from_pipe_feed fs/splice.c:415 [inline] __splice_from_pipe+0x222/0x4d0 fs/splice.c:559 splice_from_pipe fs/splice.c:594 [inline] generic_splice_sendpage+0x89/0xc0 fs/splice.c:743 do_splice_from fs/splice.c:764 [inline] direct_splice_actor+0x80/0xa0 fs/splice.c:931 splice_direct_to_actor+0x305/0x620 fs/splice.c:886 do_splice_direct+0xfb/0x180 fs/splice.c:974 do_sendfile+0x3bf/0x910 fs/read_write.c:1249 __do_sys_sendfile64 fs/read_write.c:1317 [inline] __se_sys_sendfile64 fs/read_write.c:1303 [inline] __x64_sys_sendfile64+0x10c/0x150 fs/read_write.c:1303 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x0000000000000000 -> 0xffffea0004a1d288 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
AI-Powered Analysis
Technical Analysis
CVE-2022-48689 is a medium severity vulnerability in the Linux kernel affecting the TCP zerocopy implementation. The issue arises from improper handling of the pfmemalloc page status in TCP zerocopy paths. Specifically, the kernel code incorrectly uses the page_is_pfmemalloc() function to check the pfmemalloc status of pages involved in TCP zerocopy operations. This function is intended to detect pages allocated under memory pressure conditions to avoid deadlocks, but its use in this context is inappropriate because pages coming from user space or other layers do not reliably reflect pfmemalloc status. This misuse can lead to false positives and unnecessary CPU cycles, but more critically, it introduces a data race condition as reported by Kernel Concurrency Sanitizer (KCSAN). The race condition occurs due to concurrent access and modification of linked list pointers in the Linux memory management subsystem, particularly involving the lru.next field in struct page, which was changed in a recent kernel commit to include a signature bit. The race can cause inconsistent or corrupted memory state during TCP sendpage operations, potentially leading to system instability or crashes. The vulnerability was identified through syzbot fuzzing and KCSAN reports and has been addressed by removing the pfmemalloc check in the TCP zerocopy path and introducing a prerequisite patch (__skb_fill_page_desc_noacc) to stabilize page descriptor handling. The vulnerability affects kernel versions including and after commit c07aea3ef4d4, but backporting to older kernels is not deemed necessary. Exploitation requires local privileges with low complexity, no user interaction, and can impact confidentiality, integrity, and availability to a limited extent, reflected in a CVSS score of 5.3 (medium severity). No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to servers and infrastructure running vulnerable Linux kernel versions, especially those handling high-performance networking workloads using TCP zerocopy for efficient data transfer. Potential impacts include system crashes or instability due to memory corruption, which can lead to denial of service conditions. While direct data leakage or privilege escalation is not explicitly reported, the data race and memory corruption could be leveraged in complex attack chains. Organizations relying on Linux-based servers for critical services such as web hosting, cloud infrastructure, or telecommunications could experience service disruptions. Given the medium severity and local privilege requirement, the threat is more significant for environments where untrusted users or processes have local access, such as multi-tenant cloud platforms or shared hosting providers. The absence of known exploits reduces immediate risk but patching is important to prevent future exploitation. The vulnerability also affects kernel versions commonly used in enterprise Linux distributions, which are widespread across Europe.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to those including the patch that removes the pfmemalloc check in TCP zerocopy paths and introduces __skb_fill_page_desc_noacc. Specifically, kernel versions incorporating commit 84ce071e38a6 and later should be deployed. For environments where immediate kernel upgrades are challenging, organizations should restrict local access to trusted users only, minimizing the risk of local exploitation. Monitoring kernel logs for anomalies related to TCP sendpage or memory management errors can help detect exploitation attempts. Additionally, organizations should review and harden container and virtualization environments to limit local privilege escalation vectors. Network segmentation and strict access controls can reduce exposure of vulnerable systems. Finally, coordinating with Linux distribution vendors to receive timely security updates and backports is critical to maintain secure kernel versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-03T14:55:07.144Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5e7c
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 6:56:04 PM
Last updated: 8/15/2025, 8:14:04 AM
Views: 19
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.